This publication is a collection of various common attack scenarios
Tool to simulate attacks and collect the data
Rack middleware for blocking & throttling
A tool that allows you to create vulnerable environments
UFONet - Denial of Service Toolkit
The OWASP ZAP core project
World's fastest and most advanced password recovery utility
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks
Shows how easy it would be to gain unauthorized access to a system
This is a multi-use bash script for Linux systems
In-depth attack surface mapping and asset discovery
The first messaging platform operating without user identifiers
Talos Linux is a modern Linux distribution built for Kubernetes
Brook is a cross-platform strong encryption and not detectable proxy
Powerful framework for rogue access point attack
The Chrome OS Virtual Machine Monitor
Pterodactyl® is a free, open-source game server management panel
A free and open source interactive HTTPS proxy
AWS SDK for C++
Decentralized pool for Monero mining
Automatic SQL injection and database takeover tool
game of active directory
Application that automatically prepares Android APK files for HTTPS
A versatile and portable proxy for capturing HTTP/HTTPS traffic
Arcjet JS SDKs. Rate limiting, bot protection, email verification