PHP/MySQL web application
Multi-cloud security auditing tool
Your data, your control. Fully open source, authentication, etc.
Vulnerable implementation of Facebook's GraphQL technology
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
Allows staff to easily report phishing emails to cyber security team
Vulnerable Pentesting Lab Environment
Graphical message and file encryption tool
Image Steganography
Virtual training environment to learn web app ethical hacking.
Metasploitable is an intentionally vulnerable Linux virtual machine
Low-budget password strength estimation
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs
Junk Ad Blocker