Lightweight intrusion detection for IoT and embedded devices.
All-purpose Encryption and Security Adaptation
Replace text with POS equivalent text, in a reversible fashion.
SIEM based tool supporting audit and security assessment
Data hiding in bi-level pbm images
Java code for brute forcing keystore certificates
Perform anonymous and non-anonymous pentesting.