Know the dangers of credential reuse attacks
Example PAM module demonstrating two-factor authentication
An Information Security Reference That Doesn't Suck
Chinese Ancient eBooks Generator
Sign-In with Ethereum library
To fix the Docker and UFW security flaw without disabling iptables
GRR Rapid Response, remote live forensics for incident response
Example recipes for Kubernetes Network Policies that you can just copy
Google's supported Node.js client library
A simple SSL/TLS proxy with mutual authentication
Powerful and flexible HTTP reverse proxy
Amazon SNS message validation for PHP
A static analysis security vulnerability scanner for Ruby on Rails app
Remote isolated browser API for security
Open source secure password manager
Application that automatically prepares Android APK files for HTTPS
Open OSINT stack for monitoring, analysis, and risk detection
A lightweight and easy-to-use password manager
Password protect a static HTML page
C2 framework used to aid red teamers with post-exploitation
Your performance & security consultant, an artisan command away
Anti-Spam SMTP Proxy Server implements multiple spam filters
Open source disk encryption with strong security for the Paranoid
Massive parallel data platform for analytics, machine learning and AI