Utilize all available CPU cores for accepting new client connections
Scanner detecting the use of JavaScript libraries
A fully open source & end-to-end encrypted note taking alternative
A collection of Python classes for working with network protocols
Automated hacking tool to find leaked databases with 97.1% accuracy
Security tools that can be used to audit SIP based VoIP systems
Count and limit requests by key with atomic increments
Server for security audits supporting public key authentication
Easy to use cryptographic framework for data protection
Automatic SQL injection and database takeover tool
Web application fuzzer
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Application that automatically prepares Android APK files for HTTPS
Merlin is a cross-platform post-exploitation HTTP/2 Command
Set of tools to audit SIP based VoIP Systems
CTFs as you need them
Flipper Zero firmware source code
Brook is a cross-platform strong encryption and not detectable proxy
Powerful and flexible HTTP reverse proxy
C2 framework used to aid red teamers with post-exploitation
Open source disk encryption with strong security for the Paranoid
Intelligently block brute-force attacks by aggregating system logs
This tools implements a RansomWare (cryptolocker, exfiltration, ...).
VanitySearch is a Bitcoin address prefix lookup tool.