Automating Host Exploitation with AI
Easy to use cryptographic framework for data protection
Linux/Windows post-exploitation framework made by linux user
A framework agnostic authentication & authorization system
Merlin is a cross-platform post-exploitation HTTP/2 Command
Anti-Spam SMTP Proxy Server implements multiple spam filters
deletes junk files to free disk space and improve privacy
AWStats Log Analyzer
For full, incremental, compressed and encrypted backups or archives
4MLinux fork including ClamAV scanner
KeePass Command Line Interface
Implementation of the EDIINT AS2 protocol (RFC 4130)
AS2 1.1 server implementation in Java
Wapiti is a web-application vulnerability scanner
Implementation of the OFTP2 protocol (RFC 5024)
cross-platform, encryption application
UFONet - Denial of Service Toolkit
PHP strong authentication library, web interface & CLI, OATH certified
The PE file analysis toolkit