Flipper Zero Unleashed Firmware
The first messaging platform operating without user identifiers
Application that automatically prepares Android APK files for HTTPS
C2 framework used to aid red teamers with post-exploitation
Shows how easy it would be to gain unauthorized access to a system
Klotsky class block slider puzzles.
Sokoban with many families of puzzles provided.
Collection of reverse shells for red team operations
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
Scriptable network authentication cracker (formerly `badtouch`)
Security tools that can be used to audit SIP based VoIP systems
Simple multithreading bruteforce hash cracker written in Go
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Sudomy is a subdomain enumeration tool to collect subdomains
Awesome cloud enumerator
Open source OWASP penetration testing tool written in Python 3
A post exploitation framework designed to operate covertly
Toolkit aimed to perform lateral movement in restricted environments
A very secure file vault for private files to avoid hackers
SSH man-in-the-middle tool
Perform advanced MiTM attacks on websites with ease
Prediction of proteinfolding in 2D HP model