Brute force su testi crittografati con il cifrario di Cesare.
A forensic file identification tool using neural networks
Two-factor authentication system
The Identity Manager provides a solution to manage the user life cycle
AES Encryption Program
Encrypt and decrypt text using AES 256 bit encryption
Replace text with POS equivalent text, in a reversible fashion.
Runs untrusted code in a safe, sandboxed environment easily.
Open source to productivity
A free Password Generator written in Java
TOTP authenticator for Java ME
Adobe Flash SWF file reader, editor
Java Stacked Crypto
Data hiding in bi-level pbm images
Universal Framework to audit Voip protocols's security
Encrypt a text through a list of encryption methods
A Genetic Algorithm for Reactors in StarMade
peer to peer social network