A tool that allows you to create vulnerable environments
GTFOBins is a curated list of Unix binaries
Scalable fuzzing infrastructure
A generic, spec-compliant, thorough implementation of the OAuth
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Powerful framework for rogue access point attack
Utilize all available CPU cores for accepting new client connections
Server for security audits supporting public key authentication
AWS Encryption SDK
Automatic SQL injection and database takeover tool
Alerta monitoring system
A Burp Extension for GraphQL Security Testing
The authentication glue you need
A pass extension for importing data from most existing password
With Django Hijack, admins can log in and work on behalf of others
An AI-powered security review GitHub Action using Claude
Rules engine for cloud security, cost optimization, and governance
A free and open-source program to free up disk space
irreversible cryptographic file wiper
deletes junk files to free disk space and improve privacy
This tools implements a RansomWare (cryptolocker, exfiltration, ...).