Example PAM module demonstrating two-factor authentication
A collection of malware samples and relevant dissection information
A pretty sweet vulnerability scanner
An AI-powered security review GitHub Action using Claude
An authorization library that supports access control models
deletes junk files to free disk space and improve privacy
Wapiti is a web-application vulnerability scanner
Wifi Password Generator
UNiform Interface to COmputing and data REsources
UFONet - Denial of Service Toolkit
Announcing Robolinux Cinnamon 14.1
Automating Host Exploitation with AI
A Python Package for Data Exfiltration
C2/post-exploitation framework
C2 shellcode generator/compiler/handler
Full-featured C2 framework which silently persists on webserver
Pioneering Private and Public Cloud Management since 2008
CIntruder - OCR Bruteforcing Toolkit
Toolkit aimed to perform lateral movement in restricted environments