Security tools that can be used to audit SIP based VoIP systems
The first messaging platform operating without user identifiers
A fully open source & end-to-end encrypted note taking alternative
Shows how easy it would be to gain unauthorized access to a system
Application that automatically prepares Android APK files for HTTPS
Flipper Zero firmware source code
Fully autonomous AI hacker to find actual exploits in your web apps
C2 framework used to aid red teamers with post-exploitation
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Sokoban with many families of puzzles provided.
Klotsky class block slider puzzles.
Collection of reverse shells for red team operations
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
An HTTP toolkit for security research
Scriptable network authentication cracker (formerly `badtouch`)
Simple multithreading bruteforce hash cracker written in Go
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Open source OWASP penetration testing tool written in Python 3
Sudomy is a subdomain enumeration tool to collect subdomains
Awesome cloud enumerator
A post exploitation framework designed to operate covertly
A powerful MongoDB auditing and pentesting tool
Toolkit aimed to perform lateral movement in restricted environments
SSH man-in-the-middle tool