Category
Showing 601-650 of 1,975 trending projects
A collection of Github repositories and articles with lists of dorks for different search engines.
This repository appears to contain resources related to social engineering and hacking tools, not a developer platform.
This repository generates a CobaltStrike cross-platform payload for red team activities.
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
A fork of AFL for fuzzing Windows binaries, focused on security research and finding vulnerabilities.
An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network.
A collection of tools for offensive and defensive security on the Azure AD/Microsoft Entra platform.
A C-based JWT brute force cracker for security testing and research.
A Swift obfuscator that protects iOS apps against reverse engineering attacks.
A comprehensive library of cybersecurity resources for developers and security professionals.
A collection of common system vulnerabilities encountered in red team operations.
Matsuri is an Android app and toolchain for bypassing internet censorship using Shadowsocks and V2Ray.
A curated collection of Windows Event Log samples for security research and threat hunting.
OpenKeychain is an open-source OpenPGP implementation for secure communication on Android.
A Python tool that can discover hidden IP addresses behind Cloudflare using misconfigured DNS and old database records.
A framework for detecting command and control communication through network traffic analysis.
JexBoss is a tool to verify and exploit Java deserialization vulnerabilities in JBoss and other Java applications.
This is an Android GUI application that provides tools for wireless network cracking and monitoring, not a developer platform for vibe coders.
Picocrypt is a small, secure encryption tool for developers focused on privacy and security.
Privaxy is a next-generation ad and tracker blocker that blocks ads and trackers by MITMing HTTP(s) traffic.
A secure clipboard sharing tool that allows copying and pasting anything over the network.
An open-source library for creating security detection rules and threat hunting content.
A Python toolkit for conducting phishing campaigns and security testing, not suitable for vibe coders.
This repository appears to contain C-based exploit code and is not related to a developer discovery platform focused on vibe coders.
A Python-based open-source vulnerability database and triage service for security professionals.
Reflective DLL Injection to convert DLLs into position-independent shellcode
A Go-based tool for checking if a website is vulnerable to the Heartbleed OpenSSL bug (CVE-2014-0160).
CVE cache of the official CVE List in CVE JSON 5 format, providing developers with a comprehensive vulnerability database.
A security and network analysis tool for penetration testing and man-in-the-middle attacks.
A reverse engineering framework for Flutter, focused on security research and bug bounty programs.
This repository contains a collection of vulnerability proof-of-concepts and exploits for security research purposes.
An open-source OSINT tool for finding profiles by username across various social media platforms.
A private messaging system that hides metadata, built with Go, focused on privacy and research.
SSRF (Server Side Request Forgery) testing resources for security professionals.
A collection of attack scenarios and mitigations for Microsoft Entra ID (Azure Active Directory).
A Python library that generates and resolves permutations of subdomains, useful for security researchers.
The Python Cryptography Toolkit provides a set of cryptographic primitives and utilities for developers.
Automation tool to assess M365 tenant security against CISA baselines for cybersecurity compliance.
A Python-based honeypot framework for setting up and managing modern honeypot sensors.
Easy-to-follow tutorials for beginners on using Shadowsocks to bypass internet restrictions.
This is a tool for conducting targeted evil twin attacks against WPA2-Enterprise networks and performing indirect wireless pivots using hostile portal attacks.
This is a cheatsheet for Burp Suite, a popular security testing tool used by bug bounty hunters and penetration testers.
Guidelines and training material to write secure smart contracts on the Ethereum blockchain.
A tool for creating vulnerable environments to simulate attacks and collect data into Splunk for security research and detection.
A hardware U2F security token optimized for physical security, affordability, and style.
A tool to dump a git repository from a website, useful for security researchers and developers.
A tool to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems.
A full-featured C2 framework for silently persisting on webservers with a single-line PHP backdoor.
A Python-based cybersecurity tool for hacking wireless connections using built-in Kali Linux tools.
An Android app for online privacy and security, featuring tools like Tor, I2P, and DNSCrypt.
Get weekly updates on trending AI coding tools and projects.