57 Hash Functions In One Program, plus each with HMAC or KMAC
Snare Enterprise: bit.ly/Snare-Trial
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs
Comfortable hash-tool for texts and files
Reveal Rootkit detects processes hidden by rootkits on POSIX systems.
Python Based Brute Force Password Cracking Assistant By Clownsec
A Java application for transferring computer files in 5 letter groups
Security Status Checker
Set of useful tools for payment service development