Flipper Zero Unleashed Firmware
The first messaging platform operating without user identifiers
Shows how easy it would be to gain unauthorized access to a system
Application that automatically prepares Android APK files for HTTPS
C2 framework used to aid red teamers with post-exploitation
Sokoban with many families of puzzles provided.
Klotsky class block slider puzzles.
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Collection of reverse shells for red team operations
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
Scriptable network authentication cracker (formerly `badtouch`)
Simple multithreading bruteforce hash cracker written in Go
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Security tools that can be used to audit SIP based VoIP systems
Open source OWASP penetration testing tool written in Python 3
Sudomy is a subdomain enumeration tool to collect subdomains
Awesome cloud enumerator
A post exploitation framework designed to operate covertly
A very secure file vault for private files to avoid hackers
Toolkit aimed to perform lateral movement in restricted environments
SSH man-in-the-middle tool
Prediction of proteinfolding in 2D HP model
Perform advanced MiTM attacks on websites with ease