Python3 GPG aka GnuPG Interface
Compares botnet detection methods
ROuter MAN HUNTER detects wireless attackers and captures their MAC
Sending encrypted data through internet web applications.
Open Source SCADA Security Evaluation Tool
Directory traversal exploitation tool for web developers.
Active-probing-based network IDS for wireless networks
Automatic SQL Injection Exploitation Tool
Forensic scripts for evidence acquisitions, analysis and more
Password protected zip file cracker.
sb0x-project
Enumeration and automation of file discovery for your sec tools.
An open source malware analysis tool
Lightweight Linux distro for penetration testing
A protocol agnostic application layer denial of service attack.
Tyrant SQL is a Havij based cross-platform. It's Sqlmap's gui version.
Videovigilancia, Control de Acceso y Carnetización
A script to perform SAT attacks on RSA
Visual Cryptography and Bit-Plane Complexity Segmentation in Python
Send steganographed text messages to mtr with fake hops in the network