Wordlist collection
The Pentester’s Companion
Helps with conducting forensics of mobile devices
A suite of Tools to aid Incidence Response and Live Forensics
Log management solution that improves the performance of SIEM
The open-source notification infrastructure
Vulnerable implementation of Facebook's GraphQL technology
A collection of Python classes for working with network protocols
Collection of standard and secure cryptographic algorithms
A collection of malware samples and relevant dissection information
Architect's Kung Fu tutorial collection Article collection
A Linux Toolkit for Malware Analysis
Klotsky class block slider puzzles.
The Best file security app.
Powerful webdav client and sync tools with client-side AES encryption
57 Hash Functions In One Program, plus each with HMAC or KMAC
Kernel privilege escalation vulnerability collection
A collection of custom security tools for quick needs.
Collection of reverse shells for red team operations
Image Payload Creating/Injecting tools
Wipe erase data from hdds on the network, unlimited hard disks
CloudMapper analyzes your Amazon Web Services (AWS) environments
ALL IN ONE Hacking Tool For Hackers
Have trust over arbitrary collections of data