A tool that allows you to create vulnerable environments
OSINT tool for locating WiFi networks using BSSID or SSID data
Generate probable usernames from LinkedIn company employee lists
An AI-powered security review GitHub Action using Claude
Python SDK for Fingerprint Pro Server API
The LLM vulnerability scanner
Utility for sending notifications, on demand and when commands finish
Alerta monitoring system
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Check breached emails and find exposed passwords from public dumps
Centralized platform for automated threat intelligence analysis
CLI wrapper around aws-encryption-sdk-python
A generic, spec-compliant, thorough implementation of the OAuth
The AWS exploitation framework, designed for testing security
Scalable fuzzing infrastructure
Know the dangers of credential reuse attacks
With Django Hijack, admins can log in and work on behalf of others
Bleeding edge django template focused on code quality and security
Rules engine for cloud security, cost optimization, and governance
Utilize all available CPU cores for accepting new client connections
Server for security audits supporting public key authentication
GRR Rapid Response, remote live forensics for incident response
OAuth2 goodies for the Djangonauts!
A Burp Extension for GraphQL Security Testing
Set of tools to audit SIP based VoIP Systems