Wordlist collection
The Pentester’s Companion
Log management solution that improves the performance of SIEM
Helps with conducting forensics of mobile devices
A collection of Python classes for working with network protocols
A curated list of privacy & security-focused software and services
Collection of standard and secure cryptographic algorithms
A collection of malware samples and relevant dissection information
A suite of Tools to aid Incidence Response and Live Forensics
The open-source notification infrastructure
Vulnerable implementation of Facebook's GraphQL technology
Architect's Kung Fu tutorial collection Article collection
A Linux Toolkit for Malware Analysis
The Best file security app.
Advanced web data collection and device fingerprinting framework
57 Hash Functions In One Program, plus each with HMAC or KMAC
Powerful webdav client and sync tools with client-side AES encryption
Klotsky class block slider puzzles.
Kernel privilege escalation vulnerability collection
A collection of custom security tools for quick needs.
Collection of reverse shells for red team operations
Image Payload Creating/Injecting tools
Wipe erase data from hdds on the network, unlimited hard disks
CloudMapper analyzes your Amazon Web Services (AWS) environments
ALL IN ONE Hacking Tool For Hackers