Create a centralized Authentication and Authorization token server
Internet IP/CIDR Tables Blockator
Generació regles IPTables per Continents o Països
Easily build, customize and control your own LLMs
A tool to scan Kubernetes cluster for risky permissions
Multi-core image resizer and rotator. Go crunch 'em!
Generates logs of typical formats that would often be found in a SOC
Jupyter server extension to proxy requests with AWS SigV4 authentican
Stops Solarwinds-, ESLint-, and PyTorch-like attacks
Command & Control-Framework created for collaboration in python3
passwort, passwort-generator, password, password generator
A swiss army knife for pentesting networks
A collection of custom security tools for quick needs.
Portable Penetration Testing Operating System
Enterprise IDaaS/IAM platform system
Automating Host Exploitation with AI
Identify MD5, SHA256 and 300+ other hashes
Configuration UI for Home Assistant
Web path scanner
Small Business Appliance
Quick and reliable way to convert NGINX configurations into JSON
static code analysis, to find/track sinks and bugs
An open-source web-based self-service BI for analytical databases
The next generation of Infrastructure-as-Code