PHP/MySQL web application
Username generator for penetration testing and user enumeration
Antivirus engine for detecting trojans, viruses and malware
Program for determining types of files for Windows, Linux and MacOS
A collection of software installations scripts for Windows systems
Vulnerable app with examples showing how to not use secrets
The pattern matching swiss knife for malware researchers
This publication is a collection of various common attack scenarios
Public malware techniques used in the wild: Virtual Machine, Emulation
Example recipes for Kubernetes Network Policies that you can just copy
A dead simple VPN
Arcjet JS SDKs. Rate limiting, bot protection, email verification
AWS Encryption SDK for C
Runtime type system for IO decoding/encoding
Platform-Agnostic Security Tokens
OWASP Coraza WAF is a golang modsecurity compatible firewall library
Cyberspace asset mapping and vulnerability scanning platform
Learn all about the A17 Pro, A16 Bionic, R1, M1-series
Detects phishing and lookalike domains using DNS fuzzing techniques
High-performance reconnaissance and vulnerability scanning tool
Automated framework for domain reconnaissance and vulnerability scans.
Automation framework for reconnaissance and penetration testing tasks
An evolving how-to guide for securing a Linux server
Creates shortcuts to virtually every special location or action built
A security auditor for Tailscale configurations