A tool that allows you to create vulnerable environments
This is a multi-use bash script for Linux systems
Easy to use cryptographic framework for data protection
Kheish: A multi-role LLM agent for tasks like code auditing
Web Debugging Proxy for macOS, iOS, and Android
Utilize all available CPU cores for accepting new client connections
mitmproxy implemented with golang
C2 framework used to aid red teamers with post-exploitation
Set of tools to audit SIP based VoIP Systems
Powerful and flexible HTTP reverse proxy
Scanner detecting the use of JavaScript libraries
CTFs as you need them
The Ray Tracing in One Weekend series of books
UFONet - Denial of Service Toolkit
Automated hacking tool to find leaked databases with 97.1% accuracy
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Brook is a cross-platform strong encryption and not detectable proxy
Merlin is a cross-platform post-exploitation HTTP/2 Command
A fully open source & end-to-end encrypted note taking alternative
Count and limit requests by key with atomic increments
Automatic SQL injection and database takeover tool
Build interactive dashboards in minutes
A curated collection of top-tier penetration testing tools
Generate a bunch of malicious pdf files with phone-home functionality
Kubernetes-native testing framework for test execution