Find web application vulnerabilities the easy way!
Petri net framework for security related modeling and reasoning.
Java Library for workflow handling
An RFID Access control system for the raspberry pi
ADHD provides tools for active defense.
MAN in Taiwan, MiT
a deliberately vulnerable Web application
Vulnerability Scanner
HTTP Origin Bound Authentication (HOBA)
ICAP Daemon that implements content scanning
Authentication, Access Control, and Single Sign-On
inKey - small & strong encryption utility (> 800 000 bit).
Free-SA is report generating tool for web, proxy and mail log files
Extracts multiple proxies from a list of websites
A Java application for transferring computer files in 5 letter groups
HTTP Bruteforcer
Distributed reverse / forward proxy and tunneling solution for TCP.
Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks