The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the de...
![[CIAT] Crypto Implementations Analysis Toolkit](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQG7yYq9bVVeJzfuK0lP5Spffk4_vte3xAf4sIJOvv62WacLaR81oNPM1UGicn7ospld3Ysd2uXf4_jXAPTP-If7TGoS2_fjDHLy76N-t8o9Bcv1fWhmL236dJzWodYvq3REKl2DWmxoI/s72-c/Crypto+Implementation+Analysis+Toolkit+(CIAT).png)
The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the de...
srm (secure rm) is a command-line compatible rm(1) which overwrites file contents before unlinking. The goal is to provide drop in security...
Weevely is a stealth PHP web shell that provides a telnet-like console. It is an essential tool for web application post exploitation , an...
The Sleuth Kit is a C++ library and collection of open source file system forensics tools that allow you to, among other things, view al...
Just updated DNSRecon to check if it can pull the Bind Version by doing a query for the TXT Record version.bind and it will now check if t...
Browser Password Decryptor is the FREE software to instantly recover website login passwords stored by popular web browsers. Curre...
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extract...
Twitter Password Decryptor is the FREE software to instantly recover Twitter account passwords stored by popular web browsers. Most...
Vega is a free and open source scanner and testing platform to test the security of web applications. Vega can help you find and validate ...