Easy to use cryptographic framework for data protection
A post exploitation framework designed to operate covertly
Calculate primes by using extremely fast sorting
ARP handler inspection
Open Source Penetration Testing / Ethical Hacking Framework
Buffer Overflow Exploitation Framework