A pretty sweet vulnerability scanner
OSINT fuzzing tool using Google dorks to find exposed resources
Generate probable usernames from LinkedIn company employee lists
Search GitHub for leaked API keys, credentials, and exposed secrets
Real-time GitHub monitor that detects leaked API keys and secrets
A static analysis security vulnerability scanner for Ruby on Rails app
Anti-Spam SMTP Proxy Server implements multiple spam filters
PHASH | post-quantum XOF hashing algorithm | C++20
Secure VPC Network Generator
PH2 Permutation-based cryptographic post-quantum hash library with duplex construction (C++20)
Enigma Encryption Simulator in Java
57 Hash Functions In One Program, plus each with HMAC or KMAC
ICS Sensor Traffic Simulator
Cloudflare's PKI and TLS toolkit
A file compressor with AES256CTR and Base32768 binary-to-text encoding
Passive network discovery tool focused on Layer 2 and Layer 3 packets
Checks if a phone number is registered on online services
Scan platforms to check username and email account usage
Search multiple Tor .onion engines at once and collect hidden links.
Image of OpenWrt OS, with snort community featured in.
The PE file analysis toolkit
OSINT tool to collect emails from social networks and find leaks