The first messaging platform operating without user identifiers
Easy to use cryptographic framework for data protection
Flipper Zero Unleashed Firmware
Shows how easy it would be to gain unauthorized access to a system
Security tools that can be used to audit SIP based VoIP systems
Flipper Zero firmware source code
Fully autonomous AI hacker to find actual exploits in your web apps
Application that automatically prepares Android APK files for HTTPS
C2 framework used to aid red teamers with post-exploitation
Intelligently block brute-force attacks by aggregating system logs
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
A tool to check web apps for vulnerabilty
Sokoban with many families of puzzles provided.
Klotsky class block slider puzzles.
Collection of reverse shells for red team operations
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
Windows memory hacking library
Scriptable network authentication cracker (formerly `badtouch`)
Simple multithreading bruteforce hash cracker written in Go
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Open source OWASP penetration testing tool written in Python 3
Sudomy is a subdomain enumeration tool to collect subdomains