/$$ /$$$$$$ /$$ /$$$$$$
| $$ /$$__ $$ /$$$$ /$$__ $$
| $$ /$$$$$$ /$$$$$$$$ /$$ /$$| $$ \__/ /$$$$$$ /$$$$$$$ |_ $$ |__/ \ $$
| $$ |____ $$|____ /$$/| $$ | $$| $$$$$$ /$$__ $$ /$$_____/ | $$ /$$$$$$/
| $$ /$$$$$$$ /$$$$/ | $$ | $$ \____ $$| $$$$$$$$| $$ | $$ /$$____/
| $$ /$$__ $$ /$$__/ | $$ | $$ /$$ \ $$| $$_____/| $$ | $$ | $$
| $$$$$$$$| $$$$$$$ /$$$$$$$$| $$$$$$$| $$$$$$/| $$$$$$$| $$$$$$$ /$$$$$$ /$$| $$$$$$$$
|________/ \_______/|________/ \____ $$ \______/ \_______/ \_______/ |______/|__/|________/
/$$ | $$
| $$$$$$/
\______/
/** Welcome to the Ethical Hacker Tools Archive. **/
--------------------------Information Gathering--------------------------
--------------------------Auto Scanner Vuln-------------------------------
--------------------------Encrypt/Decrypt---------------------------------