mystic-crypt is designed as a Java library that can be used for simple and complex encryption and decryption.
The source code for the library is available under https://github.com/astrapi69/mystic-crypt
For demonstration what the library can do there is a graphical client:
The source code for the ui is available under https://github.com/astrapi69/mystic-crypt-ui
A pronounceable password generator plugin for KeePass.
NOTE: This project has been discontinued. It hasn't been worth it to maintain the project for a while now, so no more updates will be made to the plugin. The algorithm this plugin uses is based off FIPS-181 which was withdrawn by NIST a while back. The proliferation of password managers that seamlessly run on multiple platforms (some of which are free) has also removed almost all advantages of using randomly generated pronounceable...
A push-button wireless hacking and Man-in-the-Middle attack toolkit
This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more).
It provides users with automated wireless attack tools that air paired with man-in-the-middle tools to effectively and silently attack wireless clients.
Some of the tools included in the kit are:
Custom regex-based DNS Server
DHCP
Aircrack-ng suite
Browser Exploitation Framework (Preconfigured for metasploit)
Metasploit
Python-based Transparent Injection...
Certificate-helper is a utility desktop application written in Java designed and created to assist (mainly developers) in creating and viewing keystores and digital certificates. This is done via a user interfaces implemented in Swing.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
NBTView is a 'NetBIOS Swiss Army Knife' written in C, and usable under several UNIX-like systems. NBTView allows you to passively monitor NetBIOS intelligence (users logged in, shares, etc.), run queries against machines, and brute-force share passwords.
Generic clustering/load-balancing platform (over a LAN or internet) using java based P2P Aorta workers that execute java "tasklets". Various tasklets can be implemented to solve fractals, process images, render webpages, crack RSA "brute force".