Category
Showing 151-200 of 1,974 trending projects
Hemmelig is an encrypted secrets management tool that keeps sensitive information secure in chat logs, emails, and more.
The Rogue Access Point Framework for security and penetration testing
A curated list of CTF (Capture the Flag) frameworks, libraries, resources and software for security professionals.
A powerful open-source recursive internet scanner for security researchers and penetration testers.
This is a wiki for Capture the Flag (CTF) challenges, covering various topics like crypto, web, reverse engineering, and more.
Curated list of privacy & security-focused software and services for developers
A curated list of tools for incident response and digital forensics investigations.
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
A malicious traffic detection system written in Python for network monitoring and security.
Secure your SSH keys using the Secure Enclave on your Mac, protecting them from unauthorized access.
Open-source tool to identify capabilities in executable files for malware analysis and reverse engineering.
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with an e-Paper display.
A repository of custom payloads for the USB Rubber Ducky, a powerful pen-testing tool for keystroke injection attacks.
This repository contains emergency response notes from a security engineer's perspective.
This repository provides a collection of free proxy, VPN, and network acceleration tools for developers to bypass internet censorship.
iOS jailbreak tool for security research and system-level experimentation on iOS 15-16
This is a collection of classic and modern trojan builders, not a developer tool for AI-powered coding.
A Raspberry Pi-based Wi-Fi hacking tool for security researchers and penetration testers.
A GDPR, WCAG 2.2 AA, and EAA compliant, self-hosted CAPTCHA alternative with a PoW mechanism.
A high-speed covert tunnel to bypass Deep Packet Inspection firewalls by disguising TCP traffic as SMTP email.
AI-powered penetration testing CLI using Gemini & LangChain for automated security workflows
A browser extension that protects your browser fingerprints across Chrome, Edge, and Firefox
A Burpsuite plugin for automating the bypass of authentication and WAF protections.
Pre-built vulnerable Docker environments for security research and learning
A powerful XSS scanning tool for security researchers and developers.
OneForAll is a powerful subdomain collection tool for security researchers and bug bounty hunters.
VeraCrypt is a disk encryption tool with strong security based on TrueCrypt, not a developer tool for vibe coders.
A comprehensive collection of Android security-related resources for developers.
This GitHub repository contains a collection of tools and techniques for Red Team and penetration testing activities.
A curated list of Awesome Red Teaming resources for security professionals and penetration testers.
A fast, simple, recursive content discovery tool written in Rust for penetration testing and security research.
This is a multi-use bash script for Linux systems to audit wireless networks.
A curated list of cryptography resources and links for developers interested in security and encryption.
Next generation web scanner for security research and penetration testing
A Python tool that helps identify and take over domains with dangling DNS records, useful for security researchers and bug bounty hunters.
A Python-based network penetration testing tool for security research and red teaming activities.
An open-source forum for discussing and circumventing internet censorship.
This PoC exploits a vulnerability to bypass Xiaomi's HyperOS community restrictions for bootloader unlocking.
A free and efficient ad-blocker and privacy guard for Windows, macOS, and Linux desktop apps.
A collection of Burpsuite plugins, articles, and usage tips for web security testing and penetration testing.
This repository provides a comprehensive collection of resources and tools for cellular network hacking.
Collection of blocklists to fill in the gaps for ad-blocking, privacy, and security purposes.
A repository that collects interesting APT reports and special IOCs for cybersecurity researchers and threat hunters.
A guide for setting up NextDNS, a privacy-focused DNS over HTTPS (DoH) proxy with advanced capabilities.
BloodHound is a tool for graphically visualizing Active Directory environments to discover attack paths.
A curated list of cybersecurity tools and resources for security professionals and enthusiasts.
A repository that automatically aggregates and classifies the latest Nuclei vulnerability POCs from Github.
A Ruby tool for automatic exploitation of XXE vulnerabilities using direct and out-of-band methods.
Get weekly updates on trending AI coding tools and projects.