Various hacking tools.
Utility for covertly moving data from one computer to another, by disguising the network traffic to look like a port scan.
Unix-based command line file encryption tool that uses the three AES candidate algorithms - Rijndael, Serpent, and Twofish.
NPC - Nearly Perfect Crypto. Extremely fast and the ultimate crypto program since it uses one time pads. However, key management is a complete bitch.