Shows how easy it would be to gain unauthorized access to a system
PHP/MySQL web application
Browser for using Tor on Windows, Mac OS X or Linux
Cloud native, security-first, API security for your infrastructure
World's fastest and most advanced password recovery utility
Antivirus engine for detecting trojans, viruses and malware
Your Essential Exam Companion for the Iamneo Portal & NPTEL Exams
Main Sigma Rule Repository
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks
Arduino IDE library
Open-source platform for IT, security, and infrastructure teams
VMS for IP Cameras
E-mails, subdomains and names
SpotX patcher used for patching the desktop version of Spotify
Decrypt passwords/cookies/history/bookmarks from the browser
Fast and customizable vulnerability scanner based on simple YAML
An open-source remote desktop, and alternative to TeamViewer
eBPF-based Security Observability and Runtime Enforcement
Minecraft mod designed to reverse-engineer
Set of Ansible scripts that simplifies the setup of a personal VPN
Repo for Blokada apps
Program for determining types of files for Windows, Linux and MacOS
OSINT Framework
NextDNS CLI client (DoH Proxy)