Sec
Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS ๐ญ
A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy.
Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
Get Android app updates straight from the source.
ClearURLs is an add-on based on the new WebExtensions technology and will automatically remove tracking elements from URLs to help protect your privacy.
๐๐ฎ๐ข๐ฅPerforms a privacy & security check of Windows 10
Hide secrets with invisible characters in plain text securely using passwords ๐ง๐ปโโ๏ธโญ
Pack up to 3MB of data into a tweetable PNG polyglot file.
Promoting Solutions that Improve Wellbeing, Freedom and Society
Disable / Hide / Suspend / Uninstall Android apps without root.
Cross-platform GUI written in Rust using ADB to debloat non-rooted Android devices. Improve your privacy, the security and battery life of your device.
GoAccess is a real-time web log analyzer and interactive viewer that runs in a terminal in *nix systems or through your browser.
๐ Love Freedom - โ Block Mass Surveillance
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Hunt down social media accounts by username across social networks
Exploitation Framework for Embedded Devices
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous โฆ
๐ฅ Web-application firewalls (WAFs) from security standpoint.
A list of interesting payloads, tips and tricks for bug bounty hunters.
All about bug bounty (bypasses, payloads, and etc)
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password ๐ก๏ธ
"Can I take over XYZ?" โ a list of services and how to claim (sub)domains with dangling DNS records.
๐ป๐ก๏ธ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.