Stars
Store securely encrypted backups in the cloud!
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Master programming by recreating your favorite technologies from scratch.
An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.
A blazing fast AI Gateway with integrated guardrails. Route to 200+ LLMs, 50+ AI Guardrails with 1 fast & friendly API.
Instant voice cloning by MIT and MyShell. Audio foundation model.
An open-source remote desktop application designed for self-hosting, as an alternative to TeamViewer.
A one-of-a-kind resume builder that keeps your privacy in mind. Completely secure, customizable, portable, open-source and free forever. Try it out today!
Turns Data and AI algorithms into production-ready web applications in no time.
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
Awesome list of open-source startup alternatives to well-known SaaS products 🚀
Test ssh login key acceptance without having the private key
Use Route53 as a super fast and reliable DB 🚀
Sync objects from VMware or redfish sources to NetBox
Rocky Linux is a community enterprise Operating System designed to be 100% bug-for-bug compatible with Enterprise Linux created in response to the effective discontinuation of CentOS.
⬆️ GitHub Actions uptime monitor & status page by @AnandChowdhary
Docker media and home server stack with Docker Compose, Traefik, Swarm Mode, Google OAuth2/Authelia, and LetsEncrypt
Monitoring and Management Web Application for ElasticSearch instances and clusters.
Ansible role which installs and configures Graylog
The easiest, and most secure way to access and protect all of your infrastructure.