Data hiding in bi-level pbm images
Role Based Access Control System
linux distro for anonymized penetration based on Kali and TAILS
Network security simulator
F-Talk cross-platform p2p encrypted secure voip software
Universal Framework to audit Voip protocols's security
Encrypt a text through a list of encryption methods
A Genetic Algorithm for Reactors in StarMade
peer to peer social network
Creates Secure Passwords
DOS Attack Tool
Simulator of access controls
A java-based interceptor for SSL/TLS protocol
Administrador Remoto
Hide your secret message into any type of files
Perform anonymous and non-anonymous pentesting.
File Encoder And Decoder