Category
Showing 401-450 of 1,975 trending projects
This is a collection of various web shells, not a developer platform focused on AI coding tools.
A powerful JavaScript and Node.js obfuscator for protecting your code and intellectual property.
A cryptography-powered, open-source toolkit for Zero Trust security in AI-driven infrastructure and applications.
An exploitation framework for embedded devices, focused on penetration testing and security research.
A free, open-source password manager compatible with KeePass, with cross-platform support.
Advanced offline password cracker supporting hundreds of hash and cipher types across multiple platforms
A comprehensive guide for mobile app security testing and reverse engineering.
This repository provides tools and tutorials for cracking WPA/WPA2 Wi-Fi passwords, which is not recommended for general use.
Clair is a static analysis tool for scanning container images and identifying vulnerabilities.
The Browser Exploitation Framework Project is a penetration testing tool for web applications.
This is a repository of cutting-edge open-source security tools for red teamers and threat hunters.
Nishang is an offensive PowerShell framework for red team, penetration testing, and security operations.
Remote administration tool for Windows, focused on security and remote control capabilities.
A comprehensive list of open-source tools for AWS security, including defensive, offensive, auditing, and incident response capabilities.
A powerful toolkit for security professionals and hackers, offering a wide range of scanning and analysis tools.
A powerful OSINT analysis and research tool for tracking people on the internet.
An automated reconnaissance framework for web applications focused on highly configurable streamlined recon process.
The Exploit Database is a collection of publicly disclosed cybersecurity vulnerabilities and exploits.
Empire is a PowerShell and Python post-exploitation agent, not a developer discovery platform for vibe coders.
proxychains is a tool that forces any TCP connection to follow through a proxy, supporting SOCKS4, SOCKS5 and HTTP(S) proxies.
A comprehensive collection of online tools for Open-Source Intelligence (OSINT) research.
A fully customizable Windows-based pentesting virtual machine distribution for security professionals.
Zeek is a powerful network analysis framework for security monitoring and incident response.
A curated list of resources for understanding and bypassing Web Application Firewalls (WAFs) from a security standpoint.
A static analysis security vulnerability scanner for Ruby on Rails applications
A repository for badUSB payloads for the Flipper Zero security device, allowing plug-and-play functionality.
A comprehensive cheatsheet for bug bounty hunters, covering various payloads, tips, and tricks.
A tool for automated decompiling and security evaluation of WeChat mini-programs, supporting decryption, unpacking, and code modification.
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework.
A network stresser tool that uses Hatsune Miku as its theme, built with TypeScript.
A comprehensive penetration testing reference bank for OSCP/PTP & PTX certification preparation.
A fast and safe Rust library for detecting memory vulnerabilities in software.
Modlishka is a reverse proxy tool for penetration testing and security research.
NullArray/AutoSploit is an automated mass exploiter tool for penetration testing and security research.
A curated collection of resources, tools, and shiny things for cybersecurity blue teams.
A cheat sheet for mobile app penetration testing covering Android, iOS, network analysis, and more.
A CLI tool that helps developers inspect Android APK files and bypass HTTPS certificate pinning
An open-source security tool for automating XSS scanning and exploiting, focused on bugbounty and devsecops.
This is the unofficial Git repository for the Tor Project, a popular tool for online privacy and anonymity.
This project is a penetration testing tool for hacking cameras and GPS locations of target devices.
A high-level C2 framework for managing reverse TCP & HoaxShell-based shells with enhanced features
A collaborative, multi-platform red teaming framework for security researchers and penetration testers.
This Rust-based repository provides tools and resources for offensive security and penetration testing.
The Bug Hunters Methodology is a comprehensive guide for penetration testing and security research.
A collection of tools and techniques for the Blue Team, focused on incident response and cybersecurity.
An advanced Python-based tool for automating the detection and exploitation of SQL injection vulnerabilities.
A curated list of resources for social engineering, a technique used to manipulate people into divulging sensitive information.
This Python program allows you to detect and view IMSI numbers of nearby cellphones.
This repository provides dynamically updated IP blocklists for defending against cyber attacks and abuses.
This repository provides a comprehensive guide to the OSCE3 (OSWE, OSEP, OSED, OSEE) offensive security certifications.
Get weekly updates on trending AI coding tools and projects.