E.System.Security
. E.System.Security is an actively
developed library for .NET that
simplifies integrating your
microservices with a Service Mesh and
provides enterprise-grade ...
Enter
Web Security Basics
. Web Security Basics is a
beginner-friendly review of essential
web security concepts that equips web
developers with foundational knowledge
about protecting ...
Enter
E.System.Security
. E.System.Security is an actively
developed library for .NET that
simplifies integrating your
microservices with a Service Mesh and
provides enterprise-grade ...
Enter
Security VMS
. Features:Intuitive, Responsive and
Resource-effective . This is an
application that can also be fetched
from
https://sourceforge.net/projects/security-vms/....
Enter
SCAP Security Guide
. The purpose of this project is to
create security policy content for
various platforms, Red Hat Enterprise
Linux, Fedora, Ubuntu, Debian, SUSE
Linux Enterpri...
Enter
Symfony Security Core
. Part of the Symfony framework, the
Security Core component provides the
foundational tools for managing
authentication, authorization, and
access control in ...
Enter
Web Security Basics
. Web Security Basics is a
beginner-friendly review of essential
web security concepts that equips web
developers with foundational knowledge
about protecting ...
Enter
spring-security-jwt-guide
. This project is a comprehensive
example repository that demonstrates how
to secure a Spring Boot application
using Spring Security and JSON Web
Tokens (JWT)....
Enter
Claude Code Security Review
. The claude-code-security-review
repository implements a GitHub Action
that uses Claude (via the Anthropic API)
to perform semantic security audits of
code ch...
Enter
Symfony Security Bundle
. Symfony Security Bundle is a powerful
tool for adding authentication and
authorization to Symfony applications.
It provides mechanisms for managing user
role...
Enter
Personal Security Checklist
. Personal Security Checklist is a
comprehensive, plain-language checklist
for improving personal digital security
and privacy across devices, accounts,
and ev...
Enter
Symfony Security Core
. Part of the Symfony framework, the
Security Core component provides the
foundational tools for managing
authentication, authorization, and
access control in ...
Enter
Spring Security
. Spring Security is a powerful and
highly customizable authentication and
access-control framework. It is the
de-facto standard for securing
Spring-based appl...
Enter
spring-security-jwt-guide
. This project is a comprehensive
example repository that demonstrates how
to secure a Spring Boot application
using Spring Security and JSON Web
Tokens (JWT)....
Enter
Claude Code Security Review
. The claude-code-security-review
repository implements a GitHub Action
that uses Claude (via the Anthropic API)
to perform semantic security audits of
code ch...
Enter
Symfony Security Bundle
. Symfony Security Bundle is a powerful
tool for adding authentication and
authorization to Symfony applications.
It provides mechanisms for managing user
role...
Enter
FMSec - File Manager Security
. FMSec (File Manager SECurity) is a
set of extensions to file managers that
enable some security-related operations
to be easily performed. The operations
are...
Enter
OWASP Juice Shop
. OWASP Juice Shop is probably the most
modern and sophisticated insecure web
application! It can be used in security
trainings, awareness demos, CTFs and as
a...
Enter
FMSec - File Manager Security
. FMSec (File Manager SECurity) is a
set of extensions to file managers that
enable some security-related operations
to be easily performed. The operations
are...
Enter
Cybersecurity AI
. CAI (Cybersecurity AI) is a
lightweight open-source framework
intended to help security practitioners
build and deploy AI-assisted automation
for defensive a...
Enter
DefectDojo
. DefectDojo is a security
orchestration and vulnerability
management platform. DefectDojo allows
you to manage your application security
program, maintain pro...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
KubeArmor
. KubeArmor is a runtime Kubernetes
security engine. It uses eBPF and Linux
Security Modules(LSM) for fortifying
workloads based on Cloud Containers,
IoT/Edge,...
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
Docker Scout CLI
. Designed to identify security issues,
outdated packages, and potential
compliance problems within container
images, Docker Scout surfaces dependency
vulnerab...
Enter
Kubescape
. An open-source Kubernetes security
platform for your clusters, CI/CD
pipelines, and IDE that seperates out
the security signal from the scanner
noise. Kubesc...
Enter
ZAP
. The OWASP Zed Attack Proxy (ZAP) is
one of the world’s most popular free
security tools and is actively
maintained by a dedicated international
team of volun...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
KubeArmor
. KubeArmor is a runtime Kubernetes
security engine. It uses eBPF and Linux
Security Modules(LSM) for fortifying
workloads based on Cloud Containers,
IoT/Edge,...
Enter
Stacklok Minder
. Minder by Stacklok is an open source
platform that helps development teams
and open source communities build more
secure software, and prove to others
that w...
Enter
Tetragon
. Tetragon is a flexible
Kubernetes-aware security observability
and runtime enforcement tool that
applies policy and filtering directly
with eBPF, allowing fo...
Enter
fsociety
. fsociety is a modular penetration
testing framework designed to provide a
unified interface for running and
managing a wide range of security tools.
It focus...
Enter
secator
. Secator is a task and workflow runner
designed to streamline security
assessments by integrating many
well-known penetration testing and
reconnaissance tools...
Enter
A.I.G
. AI-Infra-Guard is a powerful
open-source security platform from
Tencent’s Zhuque Lab designed to assess
the safety and resilience of AI
infrastructures, code...
Enter
Tracee
. Tracee is a runtime security and
observability tool that helps you
understand how your system and
applications behave. It is using eBPF
technology to tap int...
Enter
Cloud Scanner of Death
. Cloud Scanner of Death is a
professional-grade cloud security
assessment tool designed to identify
vulnerabilities, misconfigurations, and
compliance issues ...
Enter
Arkime
. Arkime is an open source,
large-scale, full packet capturing,
indexing, and database system designed
to augment existing security
infrastructure by storing a...
Enter
fsociety
. fsociety is a modular penetration
testing framework designed to provide a
unified interface for running and
managing a wide range of security tools.
It focus...
Enter
ThreatMapper
. Thousands of companies trust
Deepfence to secure their most critical
cloud workloads and applications with a
unified platform. Experience rapid
threat detect...
Enter
secator
. Secator is a task and workflow runner
designed to streamline security
assessments by integrating many
well-known penetration testing and
reconnaissance tools...
Enter
OSCAL
. NIST is developing the Open Security
Controls Assessment Language (OSCAL), a
set of hierarchical, XML-, JSON-, and
YAML-based formats that provide a
standard...
Enter
Sploitware
. Sploitware is a curated repository
that maps the world of exploit
development, offensive security, and
binary exploitation into organized
learning material. ...
Enter
Tracee
. Tracee is a runtime security and
observability tool that helps you
understand how your system and
applications behave. It is using eBPF
technology to tap int...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
PentestAgent
. PentestAgent is an open-source
autonomous security testing platform
designed to help organizations identify
vulnerabilities and assess security
posture by si...
Enter
Windows Defender Remover
. This is a command?line tool and
executable that fully disables or
removes Microsoft Defender and
associated Windows security components.
It disables the Wind...
Enter
Simple Event Correlator
. Simple Event Correlator (SEC) is a
lightweight event correlator for network
management, log file monitoring,
security management, fraud detection,
and other ...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
lynis
. Lynis is a battle-tested security
tool for systems running Linux, macOS,
or Unix-based operating system. It
performs an extensive health scan of
your systems...
Enter
Arkime
. Arkime is an open source,
large-scale, full packet capturing,
indexing, and database system designed
to augment existing security
infrastructure by storing a...
Enter
fleet
. Fleet exposes familiar concepts from
traditional MDMs like custom attributes
and dynamic grouping, but in a way that
lets you work directly with data and eve...
Enter
EMBA
. EMBA is designed as the central
firmware analysis tool for penetration
testers and product security teams. It
supports the complete security analysis
process...
Enter
HackerRepo.org
. HackerRepo is a massive curated
repository that aggregates thousands of
cybersecurity, ethical hacking, and
digital forensics resources into a
single structu...
Enter
XRAY
. XRAY is a modular security toolset
that helps developers and security
professionals analyze, fuzz, and test
web applications, protocols, and network
services...
Enter
GuardDog
. guarddog is an open-source security
tool by DataDog designed to detect risks
in open-source dependencies. It helps
developers analyze software supply chain
r...
Enter
OSS-Fuzz
. OSS-Fuzz is a large-scale fuzz
testing platform developed by Google to
improve the security and reliability of
widely used open source software. Fuzz
testing...
Enter
Hack TikTok Account with AI
. Hack TikTok Password - AI-Powered
Tool This application was made using the
API of PASS REVELATOR, for more
information about Snapchat hacking
account and sec...
Enter
OSCAL
. NIST is developing the Open Security
Controls Assessment Language (OSCAL), a
set of hierarchical, XML-, JSON-, and
YAML-based formats that provide a
standard...
Enter
Xteam
. Xteam is a command-line security
toolkit designed to provide multiple
penetration testing and
information-gathering utilities in a
single interface. It combi...
Enter
Algo VPN
. Introducing Algo, a self-hosted
personal VPN server designed for ease of
deployment and security. Algo
automatically deploys an on-demand VPN
service in the ...
Enter
Infosec Reference
. Infosec Reference is a curated
knowledge base and resource repository
for information security practitioners.
It aggregates cheat sheets, tooling
guides, pro...
Enter
Sploitware
. Sploitware is a curated repository
that maps the world of exploit
development, offensive security, and
binary exploitation into organized
learning material. ...
Enter
eMark PDF Signer
. eMark PDF Signer is a
professional-grade, open-source
application designed for creating
legally binding digital signatures on
PDF documents. Built with enter...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
PentestAgent
. PentestAgent is an open-source
autonomous security testing platform
designed to help organizations identify
vulnerabilities and assess security
posture by si...
Enter
Laravel CSP
. By default, all scripts on a webpage
are allowed to send and fetch data to
any site they want. This can be a
security problem. Imagine one of your
JavaScript...
Enter
LSG - Linux SecureGuard
. Professional antivirus solution
developed for Linux systems. Protects
your Linux servers and desktop systems
with real-time protection, network
security and ...
Enter
Simple Event Correlator
. Simple Event Correlator (SEC) is a
lightweight event correlator for network
management, log file monitoring,
security management, fraud detection,
and other ...
Enter
BunkerWeb
. Being a full-featured web server
(based on NGINX under the hood), it will
protect your web services to make them
"secure by default". BunkerWeb
integ...
Enter
fleet
. Fleet exposes familiar concepts from
traditional MDMs like custom attributes
and dynamic grouping, but in a way that
lets you work directly with data and eve...
Enter
EMBA
. EMBA is designed as the central
firmware analysis tool for penetration
testers and product security teams. It
supports the complete security analysis
process...
Enter
Deckhouse
. Deckhouse is a Kubernetes platform
that allows you to create homogeneous
K8s clusters on any infrastructure. It
manages clusters comprehensively and
“automag...
Enter
Vault
. Manage secrets and protect sensitive
data. Secure, store and tightly control
access to tokens, passwords,
certificates, encryption keys for
protecting secret...
Enter
CodeQL
. CodeQL is a semantic code analysis
engine that treats programs as queryable
databases, enabling users to write
expressive queries that identify
security vuln...
Enter
GuardDog
. guarddog is an open-source security
tool by DataDog designed to detect risks
in open-source dependencies. It helps
developers analyze software supply chain
r...
Enter
XRAY
. XRAY is a modular security toolset
that helps developers and security
professionals analyze, fuzz, and test
web applications, protocols, and network
services...
Enter
Wazuh
. Wazuh is an open-source, unified
security platform that delivers extended
detection and response (XDR) and SIEM
capabilities for on-premises, cloud,
containe...
Enter
Tailsnitch
. tailsnitch is a security auditing
tool for Tailscale networks (tailnets)
that scans configurations and device
setups to detect risky or overly
permissive set...
Enter
PentAGI
. PentAGI is a fully autonomous AI
agent system designed to perform complex
penetration testing tasks by
orchestrating multiple intelligent
components into a c...
Enter
Lighthouse Ethereum
. Lighthouse is an Ethereum consensus
client that connects to other Ethereum
consensus clients to form a resilient
and decentralized proof-of-stake
blockchain....
Enter
Strix
. Strix is an open source agent-driven
security platform that uses autonomous
AI agents to identify, investigate, and
validate vulnerabilities in software
appl...
Enter
Nebular
. Nebular is a customizable Angular UI
library that contains 40+ UI components,
four visual themes, and Auth and
Security modules. Recognized at the
prestigiou...
Enter
url-checker-php-sdk
. The EmailVeritas URL Checker PHP SDK
provides real-time phishing and
malicious link detection through the
official EmailVeritas API. It enables
developers to...
Enter
AWS EKS Terraform module
. Terraform module which creates AWS
EKS (Kubernetes) resources.
Windows-based node support is limited to
a default user data template that is
provided due to ...
Enter
Laravel CSP
. By default, all scripts on a webpage
are allowed to send and fetch data to
any site they want. This can be a
security problem. Imagine one of your
JavaScript...
Enter
Spring Boot Demo
. This repository is a hands-on, “deep
learning by doing” collection of Spring
Boot demos that you can run and study
module by module. It currently includes
66...
Enter
Sigma
. Welcome to the Sigma main rule
repository. The place where detection
engineers, threat hunters and all
defensive security practitioners
collaborate on detect...
Enter
Trivy Operator
. The Trivy Operator leverages Trivy to
continuously scan your Kubernetes
cluster for security issues. The scans
are summarised in security reports as
Kubernet...
Enter
BoringSSL
. BoringSSL is a Google-maintained fork
of OpenSSL, designed specifically to
meet the security, performance, and
maintainability needs of Google’s
infrastructu...
Enter
Scope Sentry
. ScopeSentry is an open source
cybersecurity tool designed for
cyberspace asset mapping and automated
security analysis. It helps security
researchers and pen...
Enter
Falco
. Falco is a open source project to
detect abnormal application behavior in
a cloud native environment like
Kubernetes. This cloud native runtime
security proj...
Enter
Raccoon
. Raccoon is a high-performance
offensive security tool designed to
assist with reconnaissance and
vulnerability scanning during
penetration testing and securi...
Enter
yubikey-agent
. yubikey-agent is a seamless SSH agent
specifically built for secure hardware
tokens such as YubiKey (and other PIV
tokens). It aims to replace the standard
S...
Enter
HexStrike AI MCP Agents
. HexStrike AI is an MCP server that
lets LLM agents autonomously operate a
large catalog of offensive-security
tools. Its goal is to bridge “language
models” ...
Enter
nuclei
. Nuclei is used to send requests
across targets based on a template,
leading to zero false positives and
providing fast scanning on a large
number of hosts. N...
Enter
BrowserBox
. Remote isolated browser API for
security, automation visibility and
interactivity. Run-on our cloud, or
bring your own. Full scope double
reverse web proxy w...
Enter
AICGSecEval
. AICGSecEval is an open-source
benchmark framework designed to evaluate
the security of code generated by
artificial intelligence systems. The
project was dev...
Enter
NPQ
. npq is a security-focused package
manager that analyzes npm dependencies
for potential vulnerabilities before
installation. It helps developers ensure
the sa...
Enter
Hack Outlook Account with AI
. Hack Outlook Password - AI-Powered
Tool This application was made using the
API of PASS REVELATOR, for more
information about Outlook hacking
account and sec...
Enter
bearer
. Welcome to the Bearer documentation.
Bearer is a static application security
testing (SAST) tool that scans your
source code and analyzes your data flows
to ...
Enter
Go Safe Web
. go-safeweb is a security-focused HTTP
framework for Go that bakes in secure
defaults so common web vulnerabilities
are harder to introduce. Instead of
leavin...
Enter
Trail of Bits Skills Marketplace
. Trail of Bits Skills Marketplace is a
specialized Claude Code skills
marketplace built by the security
research firm Trail of Bits that focuses
on enhancing ...
Enter
Hack Snapchat Account with AI
. Hack Snapchat Password - AI-Powered
Tool This application was made using the
API of PASS REVELATOR, for more
information about Snapchat hacking
account and s...
Enter
SIPVicious
. SIPVicious OSS has been around since
2007 and is actively updated to help
security teams, QA and developers test
SIP-based VoIP systems and applications.
Ope...
Enter
Application Inspector
. Microsoft Application Inspector is a
software source code characterization
tool that helps identify coding features
of first or third party software
componen...
Enter
Sec-Context
. Sec-Context is a curated security
research project that distills common
code anti-patterns and vulnerabilities
that generative AI tends to produce,
presentin...
Enter
Wazuh
. Wazuh is an open-source, unified
security platform that delivers extended
detection and response (XDR) and SIEM
capabilities for on-premises, cloud,
containe...
Enter
SimpleSecCamEmailNVR
. Using a security camera with SSL/TLS
e-mail capability, a local-only router,
and a computer/server, receive motion
detection videos and store them in a
local...
Enter
LLM Guard
. LLM Guard is an open-source security
toolkit designed to protect large
language model applications from various
security risks and adversarial attacks.
The l...
Enter
Tailsnitch
. tailsnitch is a security auditing
tool for Tailscale networks (tailnets)
that scans configurations and device
setups to detect risky or overly
permissive set...
Enter
Arcjet
. Arcjet helps developers protect their
apps in just a few lines of code.
Implement rate limiting, bot protection,
email verification, and defense against
comm...
Enter
Zeek
. Zeek has a long history in the open
source and digital security worlds. Vern
Paxson began developing the project in
the 1990s under the name “Bro” as a
means...
Enter
Bandit
. Bandit is a tool designed to find
common security issues in Python code.
To do this, Bandit processes each file,
builds an AST from it, and runs
appropriate ...
Enter
AWS EKS Terraform module
. Terraform module which creates AWS
EKS (Kubernetes) resources.
Windows-based node support is limited to
a default user data template that is
provided due to ...
Enter
url-checker-php-sdk
. The EmailVeritas URL Checker PHP SDK
provides real-time phishing and
malicious link detection through the
official EmailVeritas API. It enables
developers to...
Enter
Nebular
. Nebular is a customizable Angular UI
library that contains 40+ UI components,
four visual themes, and Auth and
Security modules. Recognized at the
prestigiou...
Enter
Lighthouse Ethereum
. Lighthouse is an Ethereum consensus
client that connects to other Ethereum
consensus clients to form a resilient
and decentralized proof-of-stake
blockchain....
Enter
nsjail
. A lightweight process isolation tool
that utilizes Linux namespaces, cgroups,
rlimits and seccomp-bpf syscall filters,
leveraging the Kafel BPF language for ...
Enter
StackRox Kubernetes
. The StackRox Kubernetes Security
Platform performs a risk analysis of the
container environment, delivers
visibility and runtime alerts, and
provides recomme...
Enter
Passbolt API
. Passbolt API is an open-source
password manager designed for teams. It
allows users to securely store and share
passwords using end-to-end encryption.
Passbo...
Enter
Spring Boot Demo
. This repository is a hands-on, “deep
learning by doing” collection of Spring
Boot demos that you can run and study
module by module. It currently includes
66...
Enter
Trivy Operator
. The Trivy Operator leverages Trivy to
continuously scan your Kubernetes
cluster for security issues. The scans
are summarised in security reports as
Kubernet...
Enter
Sigma
. Welcome to the Sigma main rule
repository. The place where detection
engineers, threat hunters and all
defensive security practitioners
collaborate on detect...
Enter
Mobile Verification Toolkit
. Mobile Verification Toolkit (MVT) is
a collection of utilities to simplify
and automate the process of gathering
forensic traces helpful to identify a
potent...
Enter
Falco
. Falco is a open source project to
detect abnormal application behavior in
a cloud native environment like
Kubernetes. This cloud native runtime
security proj...
Enter
Lexik JWT Authentication Bundle
. LexikJWTAuthenticationBundle is a
Symfony bundle that provides JWT (JSON
Web Token) authentication for RESTful
APIs. It simplifies the process of
generating ...
Enter
BrowserBox
. Remote isolated browser API for
security, automation visibility and
interactivity. Run-on our cloud, or
bring your own. Full scope double
reverse web proxy w...
Enter
Raccoon
. Raccoon is a high-performance
offensive security tool designed to
assist with reconnaissance and
vulnerability scanning during
penetration testing and securi...
Enter
HexStrike AI MCP Agents
. HexStrike AI is an MCP server that
lets LLM agents autonomously operate a
large catalog of offensive-security
tools. Its goal is to bridge “language
models” ...
Enter
bearer
. Welcome to the Bearer documentation.
Bearer is a static application security
testing (SAST) tool that scans your
source code and analyzes your data flows
to ...
Enter
NPQ
. npq is a security-focused package
manager that analyzes npm dependencies
for potential vulnerabilities before
installation. It helps developers ensure
the sa...
Enter
Trail of Bits Skills Marketplace
. Trail of Bits Skills Marketplace is a
specialized Claude Code skills
marketplace built by the security
research firm Trail of Bits that focuses
on enhancing ...
Enter
SafeBox
. A free and Open-Source File
Encryption and Decryption app with GUI
(Graphical User Interface) and CLI
(Command Line Interface) that help you
to protect your ...
Enter
Go Safe Web
. go-safeweb is a security-focused HTTP
framework for Go that bakes in secure
defaults so common web vulnerabilities
are harder to introduce. Instead of
leavin...
Enter
BigBountyRecon
. BigBountyRecon is an open source
reconnaissance tool designed to assist
security researchers, penetration
testers, and bug bounty hunters during
the early st...
Enter
Application Inspector
. Microsoft Application Inspector is a
software source code characterization
tool that helps identify coding features
of first or third party software
componen...
Enter
FOSUserBundle
. The FOSUserBundle adds support for a
database-backed user system in
Symfony2+. It provides a flexible
framework for user management that aims
to handle commo...
Enter
tirreno
. tirreno is an open-source security
framework. tirreno [tir.?r?.no] helps
understand, monitor, and protect your
product from threats, fraud, and abuse.
While ...
Enter
LLM Guard
. LLM Guard is an open-source security
toolkit designed to protect large
language model applications from various
security risks and adversarial attacks.
The l...
Enter
LibreSign
. Simplify your digital signatures and
document management safely and
efficiently. Beyond offering agility and
security in digital signatures and
document mana...
Enter
Zen Browser
. Experience tranquillity while
browsing the web without people tracking
you. Beautifully designed,
privacy-focused, and packed with
features. We care about yo...
Enter
Arcjet
. Arcjet helps developers protect their
apps in just a few lines of code.
Implement rate limiting, bot protection,
email verification, and defense against
comm...
Enter
Trexo PDF Signer
. Trexo PDF Signer is a
professional-grade, open-source
application designed for creating
legally binding digital signatures on
PDF documents. Built with enter...
Enter
SonarQube
. SonarQube empowers all developers to
write cleaner and safer code. Thousands
of automated Static Code Analysis rules,
protecting your app on multiple fronts,...
Enter
Bandit
. Bandit is a tool designed to find
common security issues in Python code.
To do this, Bandit processes each file,
builds an AST from it, and runs
appropriate ...
Enter
Django Hijack
. With Django Hijack, admins can log in
and work on behalf of other users
without having to know their
credentials. 3.x docs are available in
the docs folder. ...
Enter
Arduino IDE
. This repository contains the source
code of the Arduino IDE 2.x, which is
currently in the beta stage. The Arduino
IDE 2.x is a major rewrite, sharing no
cod...
Enter
Trivy
. Trivy is the most popular open source
security scanner, reliable, fast, and
easy to use. Use Trivy to find
vulnerabilities & IaC
misconfigurations, SBOM ...
Enter
nebula
. Nebula is a scalable overlay
networking tool with a focus on
performance, simplicity and security. It
lets you seamlessly connect computers
anywhere in the w...
Enter
truffleHog
. truffleHog searches through git
repositories for high entropy strings
and secrets, digging deep into commit
history. TruffleHog runs behind the
scenes to sca...
Enter
key-elf
. A powerful utility to hunt down
Bitcoin private keys from deleted
wallet.dat files or damaged hard drives.
If you accidentally deleted your Bitcoin
Core wall...
Enter
Passbolt API
. Passbolt API is an open-source
password manager designed for teams. It
allows users to securely store and share
passwords using end-to-end encryption.
Passbo...
Enter
Mobile Verification Toolkit
. Mobile Verification Toolkit (MVT) is
a collection of utilities to simplify
and automate the process of gathering
forensic traces helpful to identify a
potent...
Enter
Stegcore
. Stegcore combines cryptography and
steganography to hide encrypted data
inside ordinary files. It encrypts your
payload before embedding it, so the
hidden co...
Enter
Wapiti
. Wapiti is a vulnerability scanner for
web applications. It currently search
vulnerabilities like XSS, SQL and XPath
injections, file inclusions, command
exec...
Enter
Lexik JWT Authentication Bundle
. LexikJWTAuthenticationBundle is a
Symfony bundle that provides JWT (JSON
Web Token) authentication for RESTful
APIs. It simplifies the process of
generating ...
Enter
Rancher
. From datacenter to cloud to edge,
Rancher lets you deliver
Kubernetes-as-a-Service. Rancher is a
complete software stack for teams
adopting containers. It ad...
Enter
frida
. Dynamic instrumentation toolkit for
developers, reverse-engineers, and
security researchers. Inject your own
scripts into black box processes. Hook
any funct...
Enter
OneKeyHQ / app-monorepo
. Our crypto wallet combines robust
security with intuitive design and rich
functionality. It features a
non?custodial model, ensuring you retain
full control ...
Enter
InterceptSuite
. InterceptSuite is a cross?platform,
SOCKS5?based MITM proxy specially
designed to intercept, inspect, analyze,
and manipulate encrypted network traffic
at th...
Enter
DevSec Hardening
. Hardening adds a layer into your
automation framework, that configures
your operating systems and services. It
takes care of difficult settings,
compliance g...
Enter
CrowdSec
. CrowdSec - an open-source massively
multiplayer firewall able to analyze
visitor behavior & provide an
adapted response to all kinds of
attacks. It also ...
Enter
SafeBox
. A free and Open-Source File
Encryption and Decryption app with GUI
(Graphical User Interface) and CLI
(Command Line Interface) that help you
to protect your ...
Enter
Heartbleed
. Heartbleed contains a compact,
purpose-built implementation for
detecting the infamous Heartbleed
vulnerability in OpenSSL’s TLS heartbeat
extension (CVE-201...
Enter
Ajv JSON schema validator
. Security and reliability for
JavaScript applications. Ensure your
data is valid as soon as it's
received. Instead of having your data
validation and sani...
Enter
SpringBoot Labs
. SpringBoot-Labs is a comprehensive
learning and reference repository
created by yudaocode that explores
advanced concepts, features, and best
practices in Sp...
Enter
Selefra
. Selefra is an open-source
policy-as-code and infrastructure
analysis tool that helps engineering and
security teams gain visibility into
complex multi-cloud ...
Enter
NextDNS
. NextDNS protects you from all kinds
of security threats, blocks ads and
trackers on websites and in apps and
provides a safe and supervised Internet
for kids...
Enter
Skill Scanner
. This repository is a public
security-focused scanning tool intended
to analyze and assess AI agent skills
for potential issues, quality concerns,
and vulnera...
Enter
SpringAll
. SpringAll is a comprehensive learning
project that gathers a wide range of
Spring, Spring Boot, and Spring Cloud
demos in one repository. It is designed
for ...
Enter
Inventory
. Trickest Inventory is an open source
dataset and workflow collection designed
to provide an extensive asset inventory
for public bug bounty programs. The rep...
Enter
OmniEdge
. OmniEdge is an Open source p2p layer
2 , zero-config mesh VPN infrastructure,
a traditional VPN, AWS VPC, Ngrok, DDNS
alternative. No central server, easy to...
Enter
Username Anarchy
. Username Anarchy is an open source
command line tool designed to generate
possible usernames for use in
penetration testing and security
assessments. It focu...
Enter
Single Web Page to Edit any MySQL table
. Add a single web page to edit any
mysql table. Just put in the DB
credentials, the file handles the rest.
Optionally: * Put the credentials in a
secure /etc/...
Enter
tirreno
. tirreno is an open-source security
framework. tirreno [tir.?r?.no] helps
understand, monitor, and protect your
product from threats, fraud, and abuse.
While ...
Enter
LINKERD
. Enterprise power without enterprise
complexity. Linkerd adds security,
observability, and reliability to any
Kubernetes cluster. 100% open source,
CNCF gradu...
Enter
horcrux
. Horcrux is a command-line tool built
in Go that enables you to split a file
into encrypted fragments (“horcruxes”)
so you don’t need to remember a
pass-code ...
Enter
Harpoon
. Harpoon is a command line tool
designed to assist with open source
intelligence (OSINT) and threat
intelligence investigations. It helps
security professiona...
Enter
Awesome Stars
. awesome-hacking-lists is a curated
directory of penetration-testing tools
and productivity utilities spanning
multiple security domains. Curated lists
across...
Enter
FuzzyAI Fuzzer
. FuzzyAI is an open-source fuzzing
framework designed to test the security
and reliability of large language model
applications. The tool automates the
proces...
Enter
Pterodactyl Panel
. Pterodactyl® is a free, open-source
game server management panel built with
PHP, React, and Go. Designed with
security in mind, Pterodactyl runs all
game ser...
Enter
CloudQuery
. CloudQuery extracts, transforms and
loads your cloud assets into normalized
PostgreSQL tables. CloudQuery enables
you to assess, audit, and monitor the
confi...
Enter
Conscrypt
. Conscrypt is a modern TLS/SSL
provider for Java that replaces the
default JCE/JCA crypto stack with one
backed by BoringSSL for better
performance and securi...
Enter
SonarQube
. SonarQube empowers all developers to
write cleaner and safer code. Thousands
of automated Static Code Analysis rules,
protecting your app on multiple fronts,...
Enter
nebula
. Nebula is a scalable overlay
networking tool with a focus on
performance, simplicity and security. It
lets you seamlessly connect computers
anywhere in the w...
Enter
HostHunter
. HostHunter is an open source
reconnaissance tool designed to discover
and extract hostnames associated with a
large set of IPv4 or IPv6 addresses. It
helps s...
Enter
GitLab
. GitLab is a single-application DevOps
platform that brings source control,
CI/CD, package registries, security
scanning, and deployment pipelines under
one r...
Enter
truffleHog
. truffleHog searches through git
repositories for high entropy strings
and secrets, digging deep into commit
history. TruffleHog runs behind the
scenes to sca...
Enter
gitGraber
. gitGraber is a Python-based security
tool designed to monitor GitHub in real
time to detect exposed sensitive
information in publicly indexed
repositories. I...
Enter
Lantern
. Can't access your favorite apps?
Download Lantern to easily access
videos, messaging, and other popular
apps while at school or work. Lantern is
an appli...
Enter
multiOTP open source
. multiOTP is a PHP class, a powerful
command line utility and a web interface
developed by SysCo systčmes de
communication sa in order to provide a
completely...
Enter
CrossLinked
. CrossLinked is an open source
LinkedIn enumeration tool designed to
collect employee names associated with a
target organization. Instead of
accessing Linked...
Enter
gasmask
. GasMasK is an open source OSINT (Open
Source Intelligence) tool designed to
perform reconnaissance and information
gathering on domains and online targets.
I...
Enter
Rancher
. From datacenter to cloud to edge,
Rancher lets you deliver
Kubernetes-as-a-Service. Rancher is a
complete software stack for teams
adopting containers. It ad...
Enter
Wapiti
. Wapiti is a vulnerability scanner for
web applications. It currently search
vulnerabilities like XSS, SQL and XPath
injections, file inclusions, command
exec...
Enter
Cyber Ghost — Scanner
. CyberGhost Code Scanner — Smart
Malware Detection for Developers
CyberGhost Code Scanner is a powerful,
all-in-one executable tool designed for
source code a...
Enter
Ajv JSON schema validator
. Security and reliability for
JavaScript applications. Ensure your
data is valid as soon as it's
received. Instead of having your data
validation and sani...
Enter
Heartbleed
. Heartbleed contains a compact,
purpose-built implementation for
detecting the infamous Heartbleed
vulnerability in OpenSSL’s TLS heartbeat
extension (CVE-201...
Enter
SpringBoot Labs
. SpringBoot-Labs is a comprehensive
learning and reference repository
created by yudaocode that explores
advanced concepts, features, and best
practices in Sp...
Enter
NextDNS
. NextDNS protects you from all kinds
of security threats, blocks ads and
trackers on websites and in apps and
provides a safe and supervised Internet
for kids...
Enter