Wapiti is a vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, XXE injections, CRLF injections… It use the Python programming language. If you are like the rest of our user community, your IT team is busy. With pressure to deliver on-time projects, you don’t […]

Read More


This program generate random password of a specified length, using numbers, upper and lowercase letters and special symbols. If you are like the rest of our user community, your IT team is busy. With pressure to deliver on-time projects, you don’t have a lot of time to spend making your management tools work. You need […]

Read More


This is a user space TSS for TPM 2.0. It implements the functionality equivalent to (but not API compatible with) the TCG TSS working group’s ESAPI, SAPI, and TCTI API’s (and perhaps more) but with a hopefully simpler interface. It comes with over 110 “TPM tools” samples that can be used for scripted apps, rapid […]

Read More


KeePass is a portable password manager for PC (Windows, Linux, Mac OS X), with ports available for Android, iPhone, iPad, and more. Let’s face it, most of us use the same password over and over to avoid password management but this practice is highly risky. It means if someone gains or cracks your password, they […]

Read More


This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donated by Microsoft, with additional files to complete the implementation. See the wiki for additional support – additions to the documentation. See the companion IBM TSS at https://sourceforge.net/projects/ibmtpm20tss/ You’re probably paying […]

Read More


CyoHash is a simple shell extension that is used from within Windows Explorer to calculate the MD5 hash, SHA1 hash, or CRC32 checksum of a file. (Additional SHA256, SHA384, and SHA512 algorithms are available for users of Windows XP SP3 or newer.) You’re probably paying too much for cell phone service. Wirefly compares hundreds of […]

Read More


CIDRAM (Classless Inter-Domain Routing Access Manager) is a PHP script designed to protect websites by blocking requests originating from IP addresses regarded as being sources of undesirable traffic, including (but not limited to) traffic from non-human access endpoints, cloud services, spambots, scrapers, etc. It does this by calculating the possible CIDRs of the IP addresses […]

Read More


mod_qos is a quality of service module for the Apache Web Server. It implements control mechanisms that can provide different priority to different requests and controls server access based on available resources. You’re probably paying too much for cell phone service. Wirefly compares hundreds of plans to help you save. Enter what you need (minutes, […]

Read More


Tor Browser enables you to use Tor on Windows, Mac OS X, or Linux without needing to install any software. Tor is a software that bounces your communications around a distributed network of relays run by volunteers. This effectively prevents anyone watching your Internet connection from learning what sites you visit; it prevents the sites […]

Read More


The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected […]

Read More