Shows how easy it would be to gain unauthorized access to a system
Count and limit requests by key with atomic increments
Klotsky class block slider puzzles.
Intelligently block brute-force attacks by aggregating system logs
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Sokoban with many families of puzzles provided.
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
Scriptable network authentication cracker (formerly `badtouch`)
Simple multithreading bruteforce hash cracker written in Go
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Sudomy is a subdomain enumeration tool to collect subdomains
Awesome cloud enumerator
Prediction of proteinfolding in 2D HP model
A small, simple PHP MVC framework skeleton that encapsulates a lot of
A tool which simplifies blocking remote secure shell attacks.
C++ library for easy simulations on any CUDA/AMP/CPU or remote PC
Block undesired IPs for vsftp
Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks
Block countries via iptables and gui menu with country flags.
Code to brute force the 32-bit key used to RC4 encrypt .pwl files.