Next-Generation Linux Kernel Exploit Suggester
Pure Go HS256/384/512 JWT Token Brute-force Cracker
A post exploitation framework designed to operate covertly
Kubernetes multi-cluster management and publishing platform
Look up IP addresses using favicon hashes via Shodan
SLS Team Java Library
Re-play Security Events
The best cryptography playground available
An Application to security test RESTful web APIs.
Prediction of proteinfolding in 2D HP model
A demo for using JWT (Json Web Token) with Spring Security
powerful and useful hacker dictionary builder for a brute-force attack
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs
Fingerprint-only auth screen for KDE/Plasma
Java Library for workflow handling
FUSE File system powered by secret sharing scheme
an extremely buggy web app !
Linux Exploit Suggester; based on operating system release number
A security application that can be used as a shared service
Open Source API-centric PHP Micro-framework