Stars
Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)
Extract JavaScript source trees from Sourcemap files
An open-source UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform with web UI supporting OAuth 2.0, OIDC, SAML, CAS, LDAP, SCIM, WebAuthn, TOTP, MFA, Face ID, RADIUS, Goo…
Simple, fast, safe, compiled language for developing maintainable software. Compiles itself in <1s with zero library dependencies. Supports automatic C => V translation. https://vlang.io
Powerful Auth Management library for ReactJs-based applications
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Find, verify, and analyze leaked credentials
Just another script for automatize boolean-based blind SQL injections. (Demo)
Free and open-source software that allows users to set animated desktop wallpapers and screensavers powered by WinUI 3.
This program is used to efficiently redirect connections(TCP proxy to redirect) from one IP address/port combination to another. It is useful when operating virtual servers, dockers, firewalls and …
A repository that maps commonly used attacks using MSRPC protocols to ATT&CK
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
🖥️ P2P Remote Desktop - Portable, No Configuration or Installation Needed.
Fair-code workflow automation platform with native AI capabilities. Combine visual building with custom code, self-host or cloud, 400+ integrations.
Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode)
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut
Transforms UDP stream into (fake) TCP streams that can go through Layer 3 & Layer 4 (NAPT) firewalls/NATs.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A frontend Framework for single-page applications on top of REST/GraphQL APIs, using TypeScript, React and Material Design
Docker image to run an IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2