Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks
Password recovery tool for compressed archives and md5, sha-1/2 hashes
A tool to verify and generate MD5,SHA,CRC32 hash of multiple files
Tetrumble is encryption tool.
Java implementation of Chi-Square Attack and LSB Enhancement Attack
Active Directory password expiration notification tool
A management system for sensitive system and security information
Detects changes to your Website, finds malware
A simple script for distributed computing through PHP:
Easily calculate hash values.
A sort of a virus which secretely copies data from all the usb's