Shows how easy it would be to gain unauthorized access to a system
The first messaging platform operating without user identifiers
Application that automatically prepares Android APK files for HTTPS
Flipper Zero Unleashed Firmware
C2 framework used to aid red teamers with post-exploitation
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Scriptable network authentication cracker (formerly `badtouch`)
Sokoban with many families of puzzles provided.
Klotsky class block slider puzzles.
Security tools that can be used to audit SIP based VoIP systems
Simple multithreading bruteforce hash cracker written in Go
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Sudomy is a subdomain enumeration tool to collect subdomains
Open source OWASP penetration testing tool written in Python 3
Awesome cloud enumerator
A post exploitation framework designed to operate covertly
Toolkit aimed to perform lateral movement in restricted environments
SSH man-in-the-middle tool
Perform advanced MiTM attacks on websites with ease
Web debugging proxy based on Chrome DevTools network panel
macchanger automate script
an extremely buggy web app !
C++ library for easy simulations on any CUDA/AMP/CPU or remote PC
Penetration Testing and Security Auditing Linux Distribution