Solving the Satoshi Puzzle
UFONet - Denial of Service Toolkit
57 Hash Functions In One Program, plus each with HMAC or KMAC
Bleeding edge django template focused on code quality and security
Metlo is an open-source API security platform
The authorization Gem for Ruby on Rails
Kernel privilege escalation vulnerability collection
Automating Host Exploitation with AI
Open-Source Phishing Framework
Your Personal Hacking Terminal.
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
Security tools that can be used to audit SIP based VoIP systems
OpenSK is an open-source implementation for security keys
Vulnerable Pentesting Lab Environment
Sudomy is a subdomain enumeration tool to collect subdomains
Self-hosted platform to keep and share your content
American fuzzy lop - a security-oriented fuzzer
Build and deploy docker images to Kubernetes using git push
Expands a passphrase into several variations
Kubernetes multi-cluster management and publishing platform
SSH man-in-the-middle tool
Metasploitable is an intentionally vulnerable Linux virtual machine
Offensive Web Testing Framework (OWTF), is a framework