deliberately vulnerable operating systems
LOIC-0 Now with IRC control
Framework for Man-In-The-Middle attacks
A boost or headstart to your PL/SQL development
Both a DHCP client simulator and a DHCP attack tool.
Encrypting, anonymous, unlimited size message transfer system
Two-factor authentication system
Authentication, Access Control, and Single Sign-On
Open Source Web Single Sign-On
Open Source API-centric PHP Micro-framework
F-Talk cross-platform p2p encrypted secure voip software
An open workshop for secure application
Simulator of access controls
Perform anonymous and non-anonymous pentesting.
Drop specified IP n seconds remotely, auto-undrop it when timeout.
Commands made Easy and practical for Unix/Linux
Block undesired IPs for vsftp
Web based message encryption software
Data Access Layer 4 Java
Anti defacement command line tool