Count and limit requests by key with atomic increments
Google's supported Node.js client library
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks
E-mails, subdomains and names
Open Source Continuous File Synchronization
Scanner detecting the use of JavaScript libraries
Malicious traffic detection system
Security automation content in SCAP, Bash, Ansible, and other formats
Powerful framework for rogue access point attack
A tool that allows you to create vulnerable environments
StarHackIt: React/Native/Node fullstack starter kit
Node.js wrapper for FingerprintJS Server API
C2 framework used to aid red teamers with post-exploitation
Six Degrees of Domain Admin
Security-focused static analysis for the Phoenix Framework
The AWS exploitation framework, designed for testing security
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
A C2 post-exploitation framework
Probably the most modern and sophisticated insecure web application
Desktop application to check the strength of password
Command & Control-Framework created for collaboration in python3
Control Total sobre las conecciones de RED
Sokoban with many families of puzzles provided.
Klotsky class block slider puzzles.
A Python Package for Data Exfiltration