SQL Vulnerability Scanner
partitioning backup recovery and all kind of boot loaders
An Cryptography software with RSA algorithm
Factorial Hashing Function
Fast and Strong Data Encryption Algorithm
Passive Proxy Daemon sniffs packets and creates squid proxy logs
Extended Visual Cryptography Schemes in Python
pythonic kerberosish ticket system: easy to use, easy to subclass
password generator
PMCMA - Post Memory Corruption Memory Analysis