Shows how easy it would be to gain unauthorized access to a system
The pattern matching swiss knife for malware researchers
Ad-blocking for your Android
Cross-platform multi-protocol VPN software
Massive parallel data platform for analytics, machine learning and AI
Defeating Windows user account control
Lightweight and customizable notification daemon
SQL operating system instrumentation and monitoring framework
AWS Encryption SDK for C
Log management solution that improves the performance of SIEM
Extremely fast non-cryptographic hash algorithm
Handy, High performance, ModSecurity compatible Nginx firewall module
View and manage processes, services and more with this powerful tool
Open source disk encryption with strong security for the Paranoid
Free, easy to use, lightweight soundboard for Windows
IBM's TPM 2.0 TSS
Implementation of GlobalPlatform smart card specification
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
Secure wiping/shredding of free disk space with many methods
Announcing Robolinux Cinnamon 14.1
A bleeding-edge, security-centric Arch-based Linux distribution.
Browse on Tor/i2p, Anon p2p Chat / FileTx, Conf / Video VoIP
Encrypted volumes through command line