PHP/MySQL web application
Username generator for penetration testing and user enumeration
Antivirus engine for detecting trojans, viruses and malware
Program for determining types of files for Windows, Linux and MacOS
A collection of software installations scripts for Windows systems
Vulnerable app with examples showing how to not use secrets
The pattern matching swiss knife for malware researchers
This publication is a collection of various common attack scenarios
Public malware techniques used in the wild: Virtual Machine, Emulation
Example recipes for Kubernetes Network Policies that you can just copy
Arcjet JS SDKs. Rate limiting, bot protection, email verification
AWS Encryption SDK for C
Runtime type system for IO decoding/encoding
Platform-Agnostic Security Tokens
OWASP Coraza WAF is a golang modsecurity compatible firewall library
Detects phishing and lookalike domains using DNS fuzzing techniques
High-performance reconnaissance and vulnerability scanning tool
Automation framework for reconnaissance and penetration testing tasks
Creates shortcuts to virtually every special location or action built
A security auditor for Tailscale configurations
Linux/Windows post-exploitation framework made by linux user
Detect compliance and security violations across Infrastructure
A high-level OpenPGP library
A transparent, highly scalable and cryptographically verifiable data
A collection of scripts for assessing Microsoft Azure security