Shows how easy it would be to gain unauthorized access to a system
The pattern matching swiss knife for malware researchers
Defeating Windows user account control
Extremely fast non-cryptographic hash algorithm
World's fastest and most advanced password recovery utility
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
GnuPG 2.2, 2.3 and 2.4 distributions for OS X / macOS
edit and replay captured network traffic
Implementation of GlobalPlatform smart card specification
Fast Wipe
cross-platform, encryption application
The PE file analysis toolkit
Powerful webdav client and sync tools with client-side AES encryption
Web Gateway Appliance
SHA-256 Algorithm Implementation in C
Secure wiping/shredding of free disk space with many methods
Fine-grained authorizations and single sign-on for SSH remote commands
API for Password Manager Daemon (pwmd)
Bringing intranet on the internet with Zero-Config Mesh VPNS.