Web Security Basics
. Web Security Basics is a
beginner-friendly review of essential
web security concepts that equips web
developers with foundational knowledge
about protecting ...
Enter
Security VMS
. Features:Intuitive, Responsive and
Resource-effective . This is an
application that can also be fetched
from
https://sourceforge.net/projects/security-vms/....
Enter
SCAP Security Guide
. The purpose of this project is to
create security policy content for
various platforms, Red Hat Enterprise
Linux, Fedora, Ubuntu, Debian, SUSE
Linux Enterpri...
Enter
Symfony Security Core
. Part of the Symfony framework, the
Security Core component provides the
foundational tools for managing
authentication, authorization, and
access control in ...
Enter
Web Security Basics
. Web Security Basics is a
beginner-friendly review of essential
web security concepts that equips web
developers with foundational knowledge
about protecting ...
Enter
Claude Code Security Review
. The claude-code-security-review
repository implements a GitHub Action
that uses Claude (via the Anthropic API)
to perform semantic security audits of
code ch...
Enter
Symfony Security Bundle
. Symfony Security Bundle is a powerful
tool for adding authentication and
authorization to Symfony applications.
It provides mechanisms for managing user
role...
Enter
Personal Security Checklist
. Personal Security Checklist is a
comprehensive, plain-language checklist
for improving personal digital security
and privacy across devices, accounts,
and ev...
Enter
Symfony Security Core
. Part of the Symfony framework, the
Security Core component provides the
foundational tools for managing
authentication, authorization, and
access control in ...
Enter
Spring Security
. Spring Security is a powerful and
highly customizable authentication and
access-control framework. It is the
de-facto standard for securing
Spring-based appl...
Enter
Claude Code Security Review
. The claude-code-security-review
repository implements a GitHub Action
that uses Claude (via the Anthropic API)
to perform semantic security audits of
code ch...
Enter
OWASP Juice Shop
. OWASP Juice Shop is probably the most
modern and sophisticated insecure web
application! It can be used in security
trainings, awareness demos, CTFs and as
a...
Enter
FMSec - File Manager Security
. FMSec (File Manager SECurity) is a
set of extensions to file managers that
enable some security-related operations
to be easily performed. The operations
are...
Enter
DefectDojo
. DefectDojo is a security
orchestration and vulnerability
management platform. DefectDojo allows
you to manage your application security
program, maintain pro...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
KubeArmor
. KubeArmor is a runtime Kubernetes
security engine. It uses eBPF and Linux
Security Modules(LSM) for fortifying
workloads based on Cloud Containers,
IoT/Edge,...
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
Docker Scout CLI
. Designed to identify security issues,
outdated packages, and potential
compliance problems within container
images, Docker Scout surfaces dependency
vulnerab...
Enter
Kubescape
. An open-source Kubernetes security
platform for your clusters, CI/CD
pipelines, and IDE that seperates out
the security signal from the scanner
noise. Kubesc...
Enter
ZAP
. The OWASP Zed Attack Proxy (ZAP) is
one of the world�s most popular free
security tools and is actively
maintained by a dedicated international
team of volun...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
KubeArmor
. KubeArmor is a runtime Kubernetes
security engine. It uses eBPF and Linux
Security Modules(LSM) for fortifying
workloads based on Cloud Containers,
IoT/Edge,...
Enter
A.I.G
. AI-Infra-Guard is a powerful
open-source security platform from
Tencent�s Zhuque Lab designed to assess
the safety and resilience of AI
infrastructures, code...
Enter
Tracee
. Tracee is a runtime security and
observability tool that helps you
understand how your system and
applications behave. It is using eBPF
technology to tap int...
Enter
Cloud Scanner of Death
. Cloud Scanner of Death is a
professional-grade cloud security
assessment tool designed to identify
vulnerabilities, misconfigurations, and
compliance issues ...
Enter
Arkime
. Arkime is an open source,
large-scale, full packet capturing,
indexing, and database system designed
to augment existing security
infrastructure by storing a...
Enter
OSCAL
. NIST is developing the Open Security
Controls Assessment Language (OSCAL), a
set of hierarchical, XML-, JSON-, and
YAML-based formats that provide a
standard...
Enter
Sploitware
. Sploitware is a curated repository
that maps the world of exploit
development, offensive security, and
binary exploitation into organized
learning material. ...
Enter
Tracee
. Tracee is a runtime security and
observability tool that helps you
understand how your system and
applications behave. It is using eBPF
technology to tap int...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
PentestAgent
. PentestAgent is an open-source
autonomous security testing platform
designed to help organizations identify
vulnerabilities and assess security
posture by si...
Enter
Windows Defender Remover
. This is a command?line tool and
executable that fully disables or
removes Microsoft Defender and
associated Windows security components.
It disables the Wind...
Enter
Simple Event Correlator
. Simple Event Correlator (SEC) is a
lightweight event correlator for network
management, log file monitoring,
security management, fraud detection,
and other ...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
Arkime
. Arkime is an open source,
large-scale, full packet capturing,
indexing, and database system designed
to augment existing security
infrastructure by storing a...
Enter
fleet
. Fleet exposes familiar concepts from
traditional MDMs like custom attributes
and dynamic grouping, but in a way that
lets you work directly with data and eve...
Enter
EMBA
. EMBA is designed as the central
firmware analysis tool for penetration
testers and product security teams. It
supports the complete security analysis
process...
Enter
XRAY
. XRAY is a modular security toolset
that helps developers and security
professionals analyze, fuzz, and test
web applications, protocols, and network
services...
Enter
GuardDog
. guarddog is an open-source security
tool by DataDog designed to detect risks
in open-source dependencies. It helps
developers analyze software supply chain
r...
Enter
OSS-Fuzz
. OSS-Fuzz is a large-scale fuzz
testing platform developed by Google to
improve the security and reliability of
widely used open source software. Fuzz
testing...
Enter
Hack TikTok Account with AI
. Hack TikTok Password - AI-Powered
Tool This application was made using the
API of PASS REVELATOR, for more
information about Snapchat hacking
account and sec...
Enter
OSCAL
. NIST is developing the Open Security
Controls Assessment Language (OSCAL), a
set of hierarchical, XML-, JSON-, and
YAML-based formats that provide a
standard...
Enter
Algo VPN
. Introducing Algo, a self-hosted
personal VPN server designed for ease of
deployment and security. Algo
automatically deploys an on-demand VPN
service in the ...
Enter
Sploitware
. Sploitware is a curated repository
that maps the world of exploit
development, offensive security, and
binary exploitation into organized
learning material. ...
Enter
eMark PDF Signer
. eMark PDF Signer is a
professional-grade, open-source
application designed for creating
legally binding digital signatures on
PDF documents. Built with enter...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
PentestAgent
. PentestAgent is an open-source
autonomous security testing platform
designed to help organizations identify
vulnerabilities and assess security
posture by si...
Enter
Laravel CSP
. By default, all scripts on a webpage
are allowed to send and fetch data to
any site they want. This can be a
security problem. Imagine one of your
JavaScript...
Enter
LSG - Linux SecureGuard
. Professional antivirus solution
developed for Linux systems. Protects
your Linux servers and desktop systems
with real-time protection, network
security and ...
Enter
Simple Event Correlator
. Simple Event Correlator (SEC) is a
lightweight event correlator for network
management, log file monitoring,
security management, fraud detection,
and other ...
Enter
BunkerWeb
. Being a full-featured web server
(based on NGINX under the hood), it will
protect your web services to make them
"secure by default". BunkerWeb
integ...
Enter
fleet
. Fleet exposes familiar concepts from
traditional MDMs like custom attributes
and dynamic grouping, but in a way that
lets you work directly with data and eve...
Enter
EMBA
. EMBA is designed as the central
firmware analysis tool for penetration
testers and product security teams. It
supports the complete security analysis
process...
Enter
Deckhouse
. Deckhouse is a Kubernetes platform
that allows you to create homogeneous
K8s clusters on any infrastructure. It
manages clusters comprehensively and
�automag...
Enter
Vault
. Manage secrets and protect sensitive
data. Secure, store and tightly control
access to tokens, passwords,
certificates, encryption keys for
protecting secret...
Enter
CodeQL
. CodeQL is a semantic code analysis
engine that treats programs as queryable
databases, enabling users to write
expressive queries that identify
security vuln...
Enter
GuardDog
. guarddog is an open-source security
tool by DataDog designed to detect risks
in open-source dependencies. It helps
developers analyze software supply chain
r...
Enter
XRAY
. XRAY is a modular security toolset
that helps developers and security
professionals analyze, fuzz, and test
web applications, protocols, and network
services...
Enter
Wazuh
. Wazuh is an open-source, unified
security platform that delivers extended
detection and response (XDR) and SIEM
capabilities for on-premises, cloud,
containe...
Enter
Tailsnitch
. tailsnitch is a security auditing
tool for Tailscale networks (tailnets)
that scans configurations and device
setups to detect risky or overly
permissive set...
Enter
PentAGI
. PentAGI is a fully autonomous AI
agent system designed to perform complex
penetration testing tasks by
orchestrating multiple intelligent
components into a c...
Enter
Lighthouse Ethereum
. Lighthouse is an Ethereum consensus
client that connects to other Ethereum
consensus clients to form a resilient
and decentralized proof-of-stake
blockchain....
Enter
AWS EKS Terraform module
. Terraform module which creates AWS
EKS (Kubernetes) resources.
Windows-based node support is limited to
a default user data template that is
provided due to ...
Enter
Spring Boot Demo
. This repository is a hands-on, �deep
learning by doing� collection of Spring
Boot demos that you can run and study
module by module. It currently includes
66...
Enter
Sigma
. Welcome to the Sigma main rule
repository. The place where detection
engineers, threat hunters and all
defensive security practitioners
collaborate on detect...
Enter
Trivy Operator
. The Trivy Operator leverages Trivy to
continuously scan your Kubernetes
cluster for security issues. The scans
are summarised in security reports as
Kubernet...
Enter
BoringSSL
. BoringSSL is a Google-maintained fork
of OpenSSL, designed specifically to
meet the security, performance, and
maintainability needs of Google�s
infrastructu...
Enter
Falco
. Falco is a open source project to
detect abnormal application behavior in
a cloud native environment like
Kubernetes. This cloud native runtime
security proj...
Enter
yubikey-agent
. yubikey-agent is a seamless SSH agent
specifically built for secure hardware
tokens such as YubiKey (and other PIV
tokens). It aims to replace the standard
S...
Enter
nuclei
. Nuclei is used to send requests
across targets based on a template,
leading to zero false positives and
providing fast scanning on a large
number of hosts. N...
Enter
BrowserBox
. Remote isolated browser API for
security, automation visibility and
interactivity. Run-on our cloud, or
bring your own. Full scope double
reverse web proxy w...
Enter
NPQ
. npq is a security-focused package
manager that analyzes npm dependencies
for potential vulnerabilities before
installation. It helps developers ensure
the sa...
Enter
Hack Outlook Account with AI
. Hack Outlook Password - AI-Powered
Tool This application was made using the
API of PASS REVELATOR, for more
information about Outlook hacking
account and sec...
Enter
bearer
. Welcome to the Bearer documentation.
Bearer is a static application security
testing (SAST) tool that scans your
source code and analyzes your data flows
to ...
Enter
Trail of Bits Skills Marketplace
. Trail of Bits Skills Marketplace is a
specialized Claude Code skills
marketplace built by the security
research firm Trail of Bits that focuses
on enhancing ...
Enter
Hack Snapchat Account with AI
. Hack Snapchat Password - AI-Powered
Tool This application was made using the
API of PASS REVELATOR, for more
information about Snapchat hacking
account and s...
Enter
Application Inspector
. Microsoft Application Inspector is a
software source code characterization
tool that helps identify coding features
of first or third party software
componen...
Enter
Sec-Context
. Sec-Context is a curated security
research project that distills common
code anti-patterns and vulnerabilities
that generative AI tends to produce,
presentin...
Enter
Wazuh
. Wazuh is an open-source, unified
security platform that delivers extended
detection and response (XDR) and SIEM
capabilities for on-premises, cloud,
containe...
Enter
SimpleSecCamEmailNVR
. Using a security camera with SSL/TLS
e-mail capability, a local-only router,
and a computer/server, receive motion
detection videos and store them in a
local...
Enter
Tailsnitch
. tailsnitch is a security auditing
tool for Tailscale networks (tailnets)
that scans configurations and device
setups to detect risky or overly
permissive set...
Enter
Arcjet
. Arcjet helps developers protect their
apps in just a few lines of code.
Implement rate limiting, bot protection,
email verification, and defense against
comm...
Enter
Zeek
. Zeek has a long history in the open
source and digital security worlds. Vern
Paxson began developing the project in
the 1990s under the name �Bro� as a
means...
Enter
Bandit
. Bandit is a tool designed to find
common security issues in Python code.
To do this, Bandit processes each file,
builds an AST from it, and runs
appropriate ...
Enter
AWS EKS Terraform module
. Terraform module which creates AWS
EKS (Kubernetes) resources.
Windows-based node support is limited to
a default user data template that is
provided due to ...
Enter
Lighthouse Ethereum
. Lighthouse is an Ethereum consensus
client that connects to other Ethereum
consensus clients to form a resilient
and decentralized proof-of-stake
blockchain....
Enter
StackRox Kubernetes
. The StackRox Kubernetes Security
Platform performs a risk analysis of the
container environment, delivers
visibility and runtime alerts, and
provides recomme...
Enter
Passbolt API
. Passbolt API is an open-source
password manager designed for teams. It
allows users to securely store and share
passwords using end-to-end encryption.
Passbo...
Enter
Spring Boot Demo
. This repository is a hands-on, �deep
learning by doing� collection of Spring
Boot demos that you can run and study
module by module. It currently includes
66...
Enter
Trivy Operator
. The Trivy Operator leverages Trivy to
continuously scan your Kubernetes
cluster for security issues. The scans
are summarised in security reports as
Kubernet...
Enter
Sigma
. Welcome to the Sigma main rule
repository. The place where detection
engineers, threat hunters and all
defensive security practitioners
collaborate on detect...
Enter
Mobile Verification Toolkit
. Mobile Verification Toolkit (MVT) is
a collection of utilities to simplify
and automate the process of gathering
forensic traces helpful to identify a
potent...
Enter
Falco
. Falco is a open source project to
detect abnormal application behavior in
a cloud native environment like
Kubernetes. This cloud native runtime
security proj...
Enter
Lexik JWT Authentication Bundle
. LexikJWTAuthenticationBundle is a
Symfony bundle that provides JWT (JSON
Web Token) authentication for RESTful
APIs. It simplifies the process of
generating ...
Enter
BrowserBox
. Remote isolated browser API for
security, automation visibility and
interactivity. Run-on our cloud, or
bring your own. Full scope double
reverse web proxy w...
Enter
NPQ
. npq is a security-focused package
manager that analyzes npm dependencies
for potential vulnerabilities before
installation. It helps developers ensure
the sa...
Enter
Trail of Bits Skills Marketplace
. Trail of Bits Skills Marketplace is a
specialized Claude Code skills
marketplace built by the security
research firm Trail of Bits that focuses
on enhancing ...
Enter
Application Inspector
. Microsoft Application Inspector is a
software source code characterization
tool that helps identify coding features
of first or third party software
componen...
Enter
FOSUserBundle
. The FOSUserBundle adds support for a
database-backed user system in
Symfony2+. It provides a flexible
framework for user management that aims
to handle commo...
Enter
tirreno
. tirreno is an open-source security
framework. tirreno [tir.?r?.no] helps
understand, monitor, and protect your
product from threats, fraud, and abuse.
While ...
Enter
LibreSign
. Simplify your digital signatures and
document management safely and
efficiently. Beyond offering agility and
security in digital signatures and
document mana...
Enter
Zen Browser
. Experience tranquillity while
browsing the web without people tracking
you. Beautifully designed,
privacy-focused, and packed with
features. We care about yo...
Enter
Arcjet
. Arcjet helps developers protect their
apps in just a few lines of code.
Implement rate limiting, bot protection,
email verification, and defense against
comm...
Enter
Trexo PDF Signer
. Trexo PDF Signer is a
professional-grade, open-source
application designed for creating
legally binding digital signatures on
PDF documents. Built with enter...
Enter
SonarQube
. SonarQube empowers all developers to
write cleaner and safer code. Thousands
of automated Static Code Analysis rules,
protecting your app on multiple fronts,...
Enter
Bandit
. Bandit is a tool designed to find
common security issues in Python code.
To do this, Bandit processes each file,
builds an AST from it, and runs
appropriate ...
Enter
Django Hijack
. With Django Hijack, admins can log in
and work on behalf of other users
without having to know their
credentials. 3.x docs are available in
the docs folder. ...
Enter
Arduino IDE
. This repository contains the source
code of the Arduino IDE 2.x, which is
currently in the beta stage. The Arduino
IDE 2.x is a major rewrite, sharing no
cod...
Enter
Trivy
. Trivy is the most popular open source
security scanner, reliable, fast, and
easy to use. Use Trivy to find
vulnerabilities & IaC
misconfigurations, SBOM ...
Enter
nebula
. Nebula is a scalable overlay
networking tool with a focus on
performance, simplicity and security. It
lets you seamlessly connect computers
anywhere in the w...
Enter
truffleHog
. truffleHog searches through git
repositories for high entropy strings
and secrets, digging deep into commit
history. TruffleHog runs behind the
scenes to sca...
Enter
key-elf
. A powerful utility to hunt down
Bitcoin private keys from deleted
wallet.dat files or damaged hard drives.
If you accidentally deleted your Bitcoin
Core wall...
Enter
Passbolt API
. Passbolt API is an open-source
password manager designed for teams. It
allows users to securely store and share
passwords using end-to-end encryption.
Passbo...
Enter
Mobile Verification Toolkit
. Mobile Verification Toolkit (MVT) is
a collection of utilities to simplify
and automate the process of gathering
forensic traces helpful to identify a
potent...
Enter
Wapiti
. Wapiti is a vulnerability scanner for
web applications. It currently search
vulnerabilities like XSS, SQL and XPath
injections, file inclusions, command
exec...
Enter
Lexik JWT Authentication Bundle
. LexikJWTAuthenticationBundle is a
Symfony bundle that provides JWT (JSON
Web Token) authentication for RESTful
APIs. It simplifies the process of
generating ...
Enter
Rancher
. From datacenter to cloud to edge,
Rancher lets you deliver
Kubernetes-as-a-Service. Rancher is a
complete software stack for teams
adopting containers. It ad...
Enter
frida
. Dynamic instrumentation toolkit for
developers, reverse-engineers, and
security researchers. Inject your own
scripts into black box processes. Hook
any funct...
Enter
OneKeyHQ / app-monorepo
. Our crypto wallet combines robust
security with intuitive design and rich
functionality. It features a
non?custodial model, ensuring you retain
full control ...
Enter
InterceptSuite
. InterceptSuite is a cross?platform,
SOCKS5?based MITM proxy specially
designed to intercept, inspect, analyze,
and manipulate encrypted network traffic
at th...
Enter
DevSec Hardening
. Hardening adds a layer into your
automation framework, that configures
your operating systems and services. It
takes care of difficult settings,
compliance g...
Enter
CrowdSec
. CrowdSec - an open-source massively
multiplayer firewall able to analyze
visitor behavior & provide an
adapted response to all kinds of
attacks. It also ...
Enter
Heartbleed
. Heartbleed contains a compact,
purpose-built implementation for
detecting the infamous Heartbleed
vulnerability in OpenSSL�s TLS heartbeat
extension (CVE-201...
Enter
Ajv JSON schema validator
. Security and reliability for
JavaScript applications. Ensure your
data is valid as soon as it's
received. Instead of having your data
validation and sani...
Enter
SpringBoot Labs
. SpringBoot-Labs is a comprehensive
learning and reference repository
created by yudaocode that explores
advanced concepts, features, and best
practices in Sp...
Enter
Selefra
. Selefra is an open-source
policy-as-code and infrastructure
analysis tool that helps engineering and
security teams gain visibility into
complex multi-cloud ...
Enter
CloudQuery
. CloudQuery extracts, transforms and
loads your cloud assets into normalized
PostgreSQL tables. CloudQuery enables
you to assess, audit, and monitor the
confi...
Enter
SpringAll
. SpringAll is a comprehensive learning
project that gathers a wide range of
Spring, Spring Boot, and Spring Cloud
demos in one repository. It is designed
for ...
Enter
OmniEdge
. OmniEdge is an Open source p2p layer
2 , zero-config mesh VPN infrastructure,
a traditional VPN, AWS VPC, Ngrok, DDNS
alternative. No central server, easy to...
Enter
Single Web Page to Edit any MySQL table
. Add a single web page to edit any
mysql table. Just put in the DB
credentials, the file handles the rest.
Optionally: * Put the credentials in a
secure /etc/...
Enter
tirreno
. tirreno is an open-source security
framework. tirreno [tir.?r?.no] helps
understand, monitor, and protect your
product from threats, fraud, and abuse.
While ...
Enter
LINKERD
. Enterprise power without enterprise
complexity. Linkerd adds security,
observability, and reliability to any
Kubernetes cluster. 100% open source,
CNCF gradu...
Enter
horcrux
. Horcrux is a command-line tool built
in Go that enables you to split a file
into encrypted fragments (�horcruxes�)
so you don�t need to remember a
pass-code ...
Enter
Pterodactyl Panel
. Pterodactyl� is a free, open-source
game server management panel built with
PHP, React, and Go. Designed with
security in mind, Pterodactyl runs all
game ser...
Enter
SonarQube
. SonarQube empowers all developers to
write cleaner and safer code. Thousands
of automated Static Code Analysis rules,
protecting your app on multiple fronts,...
Enter
nebula
. Nebula is a scalable overlay
networking tool with a focus on
performance, simplicity and security. It
lets you seamlessly connect computers
anywhere in the w...
Enter
GitLab
. GitLab is a single-application DevOps
platform that brings source control,
CI/CD, package registries, security
scanning, and deployment pipelines under
one r...
Enter
truffleHog
. truffleHog searches through git
repositories for high entropy strings
and secrets, digging deep into commit
history. TruffleHog runs behind the
scenes to sca...
Enter
Lantern
. Can't access your favorite apps?
Download Lantern to easily access
videos, messaging, and other popular
apps while at school or work. Lantern is
an appli...
Enter
multiOTP open source
. multiOTP is a PHP class, a powerful
command line utility and a web interface
developed by SysCo syst�mes de
communication sa in order to provide a
completely...
Enter
Rancher
. From datacenter to cloud to edge,
Rancher lets you deliver
Kubernetes-as-a-Service. Rancher is a
complete software stack for teams
adopting containers. It ad...
Enter
Wapiti
. Wapiti is a vulnerability scanner for
web applications. It currently search
vulnerabilities like XSS, SQL and XPath
injections, file inclusions, command
exec...
Enter
Ajv JSON schema validator
. Security and reliability for
JavaScript applications. Ensure your
data is valid as soon as it's
received. Instead of having your data
validation and sani...
Enter
Heartbleed
. Heartbleed contains a compact,
purpose-built implementation for
detecting the infamous Heartbleed
vulnerability in OpenSSL�s TLS heartbeat
extension (CVE-201...
Enter
SpringBoot Labs
. SpringBoot-Labs is a comprehensive
learning and reference repository
created by yudaocode that explores
advanced concepts, features, and best
practices in Sp...
Enter
CloudQuery
. CloudQuery extracts, transforms and
loads your cloud assets into normalized
PostgreSQL tables. CloudQuery enables
you to assess, audit, and monitor the
confi...
Enter
OmniEdge
. OmniEdge is an Open source p2p layer
2 , zero-config mesh VPN infrastructure,
a traditional VPN, AWS VPC, Ngrok, DDNS
alternative. No central server, easy to...
Enter
SpringAll
. SpringAll is a comprehensive learning
project that gathers a wide range of
Spring, Spring Boot, and Spring Cloud
demos in one repository. It is designed
for ...
Enter
Single Web Page to Edit any MySQL table
. Add a single web page to edit any
mysql table. Just put in the DB
credentials, the file handles the rest.
Optionally: * Put the credentials in a
secure /etc/...
Enter
Al-Khaser
. al-khaser is an open-source
proof-of-concept security tool that
deliberately implements techniques
commonly used by real-world malware to
test and evaluate t...
Enter
LINKERD
. Enterprise power without enterprise
complexity. Linkerd adds security,
observability, and reliability to any
Kubernetes cluster. 100% open source,
CNCF gradu...
Enter
Skill Scanner
. This repository is a public
security-focused scanning tool intended
to analyze and assess AI agent skills
for potential issues, quality concerns,
and vulnera...
Enter
InQL Scanner
. A security testing tool to facilitate
GraphQL technology security auditing
efforts. InQL can be used as a
stand-alone script or as a Burp Suite
extension. Si...
Enter
Pterodactyl Panel
. Pterodactyl� is a free, open-source
game server management panel built with
PHP, React, and Go. Designed with
security in mind, Pterodactyl runs all
game ser...
Enter
koa-helmet
. koa-helmet is a wrapper for helmet to
work with koa. It provides important
security headers to make your app more
secure by default. Features:Usage is the
sa...
Enter
Tiki Wiki CMS Groupware
. "Software made the wiki way"
A full-featured, web-based, tightly
integrated, all-in-one
Wiki+CMS+Groupware, Free Source Software
(GNU/LGPL), using PH...
Enter
OpenXPKI
. The project aims at creating an
enterprise-grade PKI/Trustcenter
software supporting well established
components like RDBMS and Hardware
Security Modules. Th...
Enter
Tutanota
. Tutanota is an open source email
client focused on security and privacy.
It is built with end-to-end encryption
and 2FA, so you can be assured of utmost
emai...
Enter
badpi-cyphering
. encryption/decryption/key
generation/CRC. You may use as a library
(header *.hpp files) . Features:symetric
key algorithmdifficult Cryptanalysiszero
knowledg...
Enter
Neon Wallet
. Neon Wallet is a self-custodial
wallet for managing digital assets on
desktop and mobile, supporting Neo,
Ethereum, and EVM networks, with full
user control....
Enter
tracecat
. Tracecat is an open-source Tines /
Splunk SOAR alternative for security
engineers. We're building the
features of Tines using enterprise-grade
open-sourc...
Enter
Coin Wallet
. Coin Wallet is a non-custodial
multicurrency wallet for multiple
platforms. A secure, user-friendly
cryptocurrency wallet focused on
providing essential feat...
Enter
Mega OS (Old Versions only)
. Mega OS is an advanced operating
system designed to provide a
comprehensive and user-friendly
computing experience. It incorporates a
wide range of features ...
Enter
wolfi
. Unofficial community packages for
Wolfi Linux This project provides APK
packages for applications not yet
available in the official Wolfi
repositories, with ...
Enter
koa-helmet
. koa-helmet is a wrapper for helmet to
work with koa. It provides important
security headers to make your app more
secure by default. Features:Usage is the
sa...
Enter
Cloudflare Worker JWT
. cloudflare-worker-jwt is a JavaScript
library for handling JSON Web Tokens
(JWTs) inside Cloudflare Workers. It
enables authentication, token
validation, and...
Enter
Wabe
. Wabe is an open-source backend that
allows you to create your own fully
customizable backend in just a few
minutes. It handles database access,
automatic Gra...
Enter
IBM TPM Attestation Client Server
. This is sample code for a TCG
attestation application. It supports TPM
2.0 and TPM 1.2. It includes 5 main
pieces: 1 - An attestation server 2 - An
attestati...
Enter
Namecoin Core
. Namecoin Core is the reference
implementation of Namecoin, a
decentralized naming system based on the
Bitcoin protocol. It allows users to
register and manag...
Enter
PrivateBin
. PrivateBin is a minimalist,
open-source online pastebin that allows
users to securely share text data. It
encrypts the content client-side,
ensuring that no ...
Enter
SamFw Tool 4.9 � Samsung FRP Removal
. The SamFw Tool 4.9 is a powerful
utility designed for Samsung Android
devices. Its primary function is to
effortlessly remove Factory Reset
Protection (FRP) ...
Enter
Docker-OSX
. Run Mac OS X in Docker with
near-native performance! X11 Forwarding.
iMessage security research! iPhone USB
working! macOS in a Docker container.
Features:Co...
Enter
YubiKey Guide
. The YubiKey-Guide by drduh is a
community-maintained, in-depth tutorial
and reference on how to use a YubiKey
(hardware authentication token) with
GPG, SSH, ...
Enter
badpi-cyphering
. encryption/decryption/key
generation/CRC. You may use as a library
(header *.hpp files) . Features:symetric
key algorithmdifficult Cryptanalysiszero
knowledg...
Enter
RustDesk
. RustDesk is a full-featured open
source remote control alternative for
self-hosting and security with minimal
configuration. Desktop versions use
Flutter or ...
Enter
Tutanota
. Tutanota is an open source email
client focused on security and privacy.
It is built with end-to-end encryption
and 2FA, so you can be assured of utmost
emai...
Enter
TwitterOAuth
. The most popular PHP library for use
with the Twitter OAuth REST API. The
recommended and easy as pie method is
Composer. Setup require in your projects
comp...
Enter
tracecat
. Tracecat is an open-source Tines /
Splunk SOAR alternative for security
engineers. We're building the
features of Tines using enterprise-grade
open-sourc...
Enter
RabbitRemoteControl
. Rabbit Remote Control is a
open-source, cross-platform,
multi-protocol remote control software.
Allows you to use any device and system
in anywhere and remot...
Enter
GoofCord
. Take control of your Discord
experience with GoofCord, the highly
configurable and privacy-focused Discord
client. Privacy first: GoofCord blocks
all trackin...
Enter
Google Node.js Datastore
. Google�s Node.js Datastore client is
a library for interacting with Google
Cloud Datastore, a fully managed NoSQL
database. It enables developers to store
an...
Enter
Hubble
. Hubble is a fully distributed
networking and security observability
platform for cloud native workloads. It
is built on top of Cilium and eBPF to
enable deep...
Enter
Mega OS (Old Versions only)
. Mega OS is an advanced operating
system designed to provide a
comprehensive and user-friendly
computing experience. It incorporates a
wide range of features ...
Enter
Password Pusher
. Give your users the tools to be
secure by default. Password Pusher is an
open source application to communicate
passwords over the web. Links to
passwords ex...
Enter
ClusterFuzz
. ClusterFuzz is a scalable fuzzing
infrastructure that finds security and
stability issues in software. Google
uses ClusterFuzz to fuzz all Google
products an...
Enter
Open Policy Agent
. Policy-based control for cloud-native
environments. Flexible, fine-grained
control for administrators across the
stack. Stop using a different policy
languag...
Enter
React Native Auth0
. With a few lines of code, you can
have Auth0 integrated into any app
written in any language, and any
framework. We provide 30+ SDKs &
Quickstarts to hel...
Enter
Zuul
. Zuul is an L7 application gateway
that offers many capabilities, including
dynamic routing, monitoring, security,
resiliency and more. It is used in the
back...
Enter
wolfi
. Unofficial community packages for
Wolfi Linux This project provides APK
packages for applications not yet
available in the official Wolfi
repositories, with ...
Enter
Boulder
. This is an implementation of an
ACME-based CA. The ACME protocol allows
the CA to automatically verify that an
applicant for a certificate actually
controls ...
Enter
Naeon
. Naeon is a data encryption and
sharding method designed to secure data
in potentially untrusted off-site
storage locations. It uses AES-256
encryption with a...
Enter
Decred
. dcrd is the full-node implementation
of Decred, a hybrid
proof-of-work/proof-of-stake
cryptocurrency focused on decentralized
governance, long-term sustainab...
Enter
WAFW00F
. The Web Application Firewall
Fingerprinting Tool. Sends a normal HTTP
request and analyses the response; this
identifies a number of WAF solutions. If
that i...
Enter
Ring
. This repo contains unofficial
packages to enable interaction and
automation with the majority of Ring
products. The ring-client-API is a
TypeScript package d...
Enter
Spree Commerce
. Spree Commerce is a complete, free
and open source e-commerce solution
built with Ruby on Rails. It offers a
modern, mobile-first UX, optional PWA
frontend, ...
Enter
Notesnook
. Notesnook makes it impossible for
anyone to spy on your notes. Unlike
Evernote and other note taking apps,
your data is private, not open for
everyone to see...
Enter
UTMStack
. Welcome to the UTMStack open-source
project! UTMStack is a unified threat
management platform that merges SIEM
(Security Information and Event
Management) an...
Enter
Authelia
. Authelia is an open-source
authentication and authorization server
and portal fulfilling the identity and
access management (IAM) role of
information securit...
Enter
ZIO JSON
. ZIO Json is a fast and secure JSON
library with tight ZIO integration. The
goal of this project is to create the
best all-round JSON library for Scala.
Extre...
Enter
Nextcloud Server
. Nextcloud server is a free and open
source server software that allows you
to store all of your data in a server of
your choosing. With Nextcloud you can
eas...
Enter