Shows how easy it would be to gain unauthorized access to a system
SQL operating system instrumentation and monitoring framework
edit and replay captured network traffic
IBM's TPM 2.0 TSS
OpenSC - tools and libraries for smart cards
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
The PE file analysis toolkit
Portable Penetration Testing Operating System
Powerful webdav client and sync tools with client-side AES encryption
Encrypted volumes through command line
Web security protection system based on openresty
52 Hash Functions In One Program, plus each with HMAC or KMAC
Advanced Ethical Hacking and Penetration Testing Platform
Snare Enterprise: bit.ly/Snare-Trial
a Toolset for Molecular Mechanical Force Field Parameterization
One-time-pad encryption using a virtual pad
Hexadecimal and raw packet injector and sniffer.
Classic & Modern Cryptography tools