Shows how easy it would be to gain unauthorized access to a system
World's fastest and most advanced password recovery utility
The Open Source Security Platform
The pattern matching swiss knife for malware researchers
Massive parallel data platform for analytics, machine learning and AI
A modern, portable, easy to use crypto library
Mirror of BoringSSL
Cross-platform multi-protocol VPN software
OSS-Fuzz - continuous fuzzing for open source software
Easy to use cryptographic framework for data protection
AWS Encryption SDK for C
Handy, High performance, ModSecurity compatible Nginx firewall module
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
Extremely fast non-cryptographic hash algorithm
Bug-fix-only libev port of shadowsocks
Log management solution that improves the performance of SIEM
Example PAM module demonstrating two-factor authentication
SQL operating system instrumentation and monitoring framework
P2P DNS with content key, crypto key and PKI support
All-in-one solution for high performance web content delivery
A dead simple VPN
Lightweight and customizable notification daemon
Open source disk encryption with strong security for the Paranoid