Shows how easy it would be to gain unauthorized access to a system
Flipper Zero Unleashed Firmware
Privilege Escalation Awesome Scripts SUITE
The Ray Tracing in One Weekend series of books
Web Debugging Proxy for macOS, iOS, and Android
WindowTextExtractor allows you to get a text from any OS
C2 framework used to aid red teamers with post-exploitation
Easy to use cryptographic framework for data protection
World's fastest and most advanced password recovery utility
Open source disk encryption with strong security for the Paranoid
Tiny and obfuscated ASP.NET webshell for C# web applications
Intelligently block brute-force attacks by aggregating system logs
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
Regain access to your crypto wallet
Portable Penetration Testing Operating System
ISB (I'm so bored) is a network stress-testing application for Windows
Yggdrasil Network address CPU miner in C++
MaddCrypt is a simple Protector for your .NET application
Klotsky class block slider puzzles.
FTP BruteForce tool For real Pentest
powerful SSH BruteForce tool
C2 shellcode generator/compiler/handler