Easy to use cryptographic framework for data protection
Set of tools to audit SIP based VoIP Systems
A simple SSL/TLS proxy with mutual authentication
Automatic SQL injection and database takeover tool
Malicious traffic detection system
Utilize all available CPU cores for accepting new client connections
A high-level OpenPGP library
Anti-Spam SMTP Proxy Server implements multiple spam filters
Robust and flexible VPN network tunnelling
Single Packet Authorization, Port Knocking
minimalistic, secure and autonomous P2P messenger
A network security analysis and monitoring toolkit Linux distribution.
It's easy to use android botnet work without port forwarding
An automated phishing tool with 30+ templates
Your Personal Hacking Terminal.
CloudMapper analyzes your Amazon Web Services (AWS) environments
Lightweight, high-performance, powerful intranet penetration proxy
Multiple server/webapp vulnerability scanner
A powerful MongoDB auditing and pentesting tool
Java SSH API
Network Pivoting Toolkit
SIA receiver for Galaxy security control panels.
Nash Operating System for Modern Ecommerce