The first messaging platform operating without user identifiers
Shows how easy it would be to gain unauthorized access to a system
Count and limit requests by key with atomic increments
Application that automatically prepares Android APK files for HTTPS
C2 framework used to aid red teamers with post-exploitation
Klotsky class block slider puzzles.
Intelligently block brute-force attacks by aggregating system logs
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Sokoban with many families of puzzles provided.
Collection of reverse shells for red team operations
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
Scriptable network authentication cracker (formerly `badtouch`)
Simple multithreading bruteforce hash cracker written in Go
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Security tools that can be used to audit SIP based VoIP systems
Open source OWASP penetration testing tool written in Python 3
Sudomy is a subdomain enumeration tool to collect subdomains
Awesome cloud enumerator
A post exploitation framework designed to operate covertly
Toolkit aimed to perform lateral movement in restricted environments
SSH man-in-the-middle tool
Prediction of proteinfolding in 2D HP model
Perform advanced MiTM attacks on websites with ease
Web debugging proxy based on Chrome DevTools network panel