Wordlist collection
The Pentester’s Companion
Helps with conducting forensics of mobile devices
Log management solution that improves the performance of SIEM
A collection of malware samples and relevant dissection information
The open-source notification infrastructure
A curated list of privacy & security-focused software and services
A collection of Python classes for working with network protocols
A suite of Tools to aid Incidence Response and Live Forensics
Vulnerable implementation of Facebook's GraphQL technology
Collection of standard and secure cryptographic algorithms
Architect's Kung Fu tutorial collection Article collection
A Linux Toolkit for Malware Analysis
The Best file security app.
57 Hash Functions In One Program, plus each with HMAC or KMAC
Klotsky class block slider puzzles.
Powerful webdav client and sync tools with client-side AES encryption
Kernel privilege escalation vulnerability collection
A collection of custom security tools for quick needs.
Collection of reverse shells for red team operations
Image Payload Creating/Injecting tools
Wipe erase data from hdds on the network, unlimited hard disks
CloudMapper analyzes your Amazon Web Services (AWS) environments
ALL IN ONE Hacking Tool For Hackers