Shows how easy it would be to gain unauthorized access to a system
Dynamic instrumentation toolkit for developers
Cloud native, security-first, API security for your infrastructure
Proxy server to bypass Cloudflare protection
E-mails, subdomains and names
The first messaging platform operating without user identifiers
Flipper Zero Unleashed Firmware
Identity and access management for modern applications and services
Next Generation of ShadowsocksX
KeePassXC is a cross-platform community-driven port
Defeating Windows user account control
Application that automatically prepares Android APK files for HTTPS
Testing TLS/SSL encryption anywhere on any port
A vulnerability scanner for container images and filesystems
Cross platform web application firewall (WAF) engine for Apache
IPBan is a trusted, free security software to block hackers
In-depth attack surface mapping and asset discovery
A static analysis security vulnerability scanner for Ruby on Rails app
Extremely fast non-cryptographic hash algorithm
Loads environment variables automatically
Detect compliance and security violations across Infrastructure
Your performance & security consultant, an artisan command away
Secure and performant Wordpress installation on Kubernetes cluster
Cherrybomb is a CLI tool that helps you avoid undefined user behaviour
Axios + standardized errors + request/response transforms