pyGlobalPlatform is a free open source GlobalPlatform library that can be used to JavaCard and other smartcards. You can use it to write python scripts for card resource management of GlobalPlatform cards. You can use ‘pip’ to install this smart card library. For more Details, you can visit If you are like the rest of […]

Read More


SmartRouter Project A GNU/Linux Router, Firewall and Proxy Server 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 129 Reviews Unrivaled value & reliability in one solution Unlimited Calls/SMS/Conferencing/Fax Trusted by 350,000+ Businesses

Read More


Zebedee is a simple program to establish an encrypted, compressed “tunnel” for TCP/IP or UDP data transfer between two systems. Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring […]

Read More


KeePass Plugin to count and show entries sharing a password Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.

Read More


SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel […]

Read More


SeaMonster is a security modeling tool for threat models. It supports notations that security experts and analyzers are already familiar with, namely attack trees and misuse cases, and can connect to a repository for model sharing and reuse. Today’s small-to-medium-sized (SMB) businesses and large enterprises are saving on their monthly communications costs by making one […]

Read More


Many a times when we connect our PenDrive to a PC or Laptop, wedon’t see our files and folders, instead see one or multiple shortcuts. Assuming these shortcuts as innocent, we launch them which in turn infects our PC or laptop with a virus which the geeks call Win32:Atraps-PZ[Trojan] Simply speaking, the shortcut creates a […]

Read More


The Safe C Library provides bound checking memory and string functions per ISO/IEC TR24731. These functions are alternative functions to the existing standard C library that promote safer, more secure programming. The ISO/IEC Programming languages — C spec, C11, now includes the bounded APIs in Appendix K, “Bounds-checking interfaces”. This latest upload supports building static […]

Read More


Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action […]

Read More


BTS PenTesting Lab is an open source vulnerable web application, created by Cyber Security & Privacy Foundation (www.cysecurity.org). It can be used to learn about many different types of web application vulnerabilities. Currently, the app contains the following types of vulnerabilities: *SQL Injection *XSS(includes Flash Based xss) *CSRF *Clickjacking *SSRF *File Inclusion * Code Execution […]

Read More