Virtual Machine Image To Test Penetration Skills
Two-factor authentication system
Sending encrypted data through internet web applications.
Enumeration and automation of file discovery for your sec tools.
A protocol agnostic application layer denial of service attack.