Shows how easy it would be to gain unauthorized access to a system
Flipper Zero Unleashed Firmware
Application that automatically prepares Android APK files for HTTPS
The first messaging platform operating without user identifiers
C2 framework used to aid red teamers with post-exploitation
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
A tool to check web apps for vulnerabilty
MaddCrypt is a simple Protector for your .NET application
Scriptable network authentication cracker (formerly `badtouch`)
Sokoban with many families of puzzles provided.
Klotsky class block slider puzzles.
Security tools that can be used to audit SIP based VoIP systems
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Simple multithreading bruteforce hash cracker written in Go
Sudomy is a subdomain enumeration tool to collect subdomains
Open source OWASP penetration testing tool written in Python 3
Awesome cloud enumerator
A post exploitation framework designed to operate covertly
Using our program, you can create a strong password with ease.
Toolkit aimed to perform lateral movement in restricted environments
A very secure file vault for private files to avoid hackers