Data hiding in bi-level pbm images
File manager software
Java code for brute forcing keystore certificates
A cryptocurrency like Bitcoin improved upon with reality binding.
Universal Framework to audit Voip protocols's security
Network security simulator
F-Talk cross-platform p2p encrypted secure voip software
peer to peer social network
Encrypt a text through a list of encryption methods
A Genetic Algorithm for Reactors in StarMade
DOS Attack Tool
Simulator of access controls
A java-based interceptor for SSL/TLS protocol
Administrador Remoto
Perform anonymous and non-anonymous pentesting.
Hide your secret message into any type of files
jEncrypt is a command line file encryption archiver