A pretty sweet vulnerability scanner
XRay for recon, mapping and OSINT gathering from public networks
A security auditor for Tailscale configurations
A collection of malware samples and relevant dissection information
Spring Security With JWT
An authorization library that supports access control models
Easy to use cryptographic framework for data protection
Example PAM module demonstrating two-factor authentication
110+ developer tools as native MacOS, Linux & Windows desktop apps.
Wapiti is a web-application vulnerability scanner
For full, incremental, compressed and encrypted backups or archives
cross-platform, encryption application
Encrypt and manage secret text data
A version of Midbar data vault adapted for the ESP32 CYD and WebFlash.
ESP32 CYD version of the Electronic Shelf Label.
The PE file analysis toolkit
Midbar Firebase Edition stores data in the cloud, keeps keys on device
PHASH | post-quantum XOF hashing algorithm | C++20