Shows how easy it would be to gain unauthorized access to a system
Cryptol: The Language of Cryptography
Declarative style of authorization and validation in laravel
Amplication is an open‑source development tool
Proxy server to bypass Cloudflare protection
A stable and secure tunnel based on KCP with N:M multiplexing and FEC
Security scanner for your Terraform code
Loads environment variables automatically
Count and limit requests by key with atomic increments
An application to securely communicate passwords over the web
Serve as a reverse proxy to protect your web services from attacks
A static analysis security vulnerability scanner for Ruby on Rails app
Cross platform web application firewall (WAF) engine for Apache
OpenZeppelin Contracts is a library for secure smart contracts
Kubernetes-like control planes for form-factors
A vulnerability scanner for container images and filesystems
Open-source observability for microservices
WAFW00F allows one to identify and fingerprint Web App Firewall
Identity and access management for modern applications and services
Example PAM module demonstrating two-factor authentication
The open-source notification infrastructure
Kubernetes object analysis with recommendations
Application that automatically prepares Android APK files for HTTPS
Open-source tool to enforce privacy & security best-practices
Arcjet JS SDKs. Rate limiting, bot protection, email verification