I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wr...
![[I2P] Anonymizing Network](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWBgiCq77prns-C0EJaQuhm5P9AFxvw9bp3e07s4hnApml5JFyMKvvF-8jWRhY7TqZ_db10XkPzsS0LIUfKLg5Hr7dvX-N-0gb_FkG9nn6K3KGSlA6vB1ghzNciE_GgWETcxCaoyLWJwM/s72-c/i2plogo.png)
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wr...
Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully...
The Problem In 2013, assessing the security of iOS applications still involves a lot of manual, time-consuming tasks - especially when per...
Not an inspection proxy RAFT is a testing tool for the identification of vulnerabilities in web applications. RAFT is a suite of tools t...
Normally a web application should identify a logged in user by data which is stored on the server side in some kind of session storage. Howe...
Pyew is a (command line) python tool to analyse malware. It does have support for hexadecimal viewing, disassembly (Intel 16, 32 and 64 bi...
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is...
Auto Rooting: 2.6.32-46-2011 2.6.37 2.6.33 2.6.18-164-2010 2.6.18-194 2.6.18-6-x86-2011 2.6.18-164 2.6.18-274-2011 2.6.28-2011 etc... CL...
Arachni is a Free/Open Source project, the code is released under the Apache License Version 2.0 and you are free to use it as you see fit...