Stars
A community-supported supercharged document management system: scan, index and archive all your documents
A tool for prompting users to approve Screen Recording on macOS
OWASP Foundation web repository
An extremely fast Python package and project manager, written in Rust.
Rust tool to detect cell site simulators on an orbic mobile hotspot
Modern, Streamlined, Free and Open Source Customer Service Software
A fundamental toolkit designed for music, song, and audio generation
Pear š is extension for music player
Bandit is a tool designed to find common security issues in Python code.
AI reads books: Page-by-Page PDF Knowledge Extractor & Summarizer. script performs an intelligent page-by-page analysis of PDF books, methodically extracting knowledge points and generating progresā¦
Depix is a PoC for a technique to recover plaintext from pixelized screenshots.
All-sources tool to search websites by favicons
Pure Malware Development Resource Collections
Ultimate camera streaming application with support RTSP, RTMP, HTTP-FLV, WebRTC, MSE, HLS, MP4, MJPEG, HomeKit, FFmpeg, etc.
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
Open source DocuSign alternative. Create, fill, and sign digital documents āļø
A Comprehensive Toolkit for High-Quality PDF Content Extraction
Enhanced ChatGPT Clone: Features Agents, MCP, DeepSeek, Anthropic, AWS, OpenAI, Responses API, Azure, Groq, o1, GPT-5, Mistral, OpenRouter, Vertex AI, Gemini, Artifacts, AI model switching, messageā¦
Free, simple, and intuitive online database diagram editor and SQL generator.
Database diagrams editor that allows you to visualize and design your DB with a single query.
Open Adversarial Exposure Validation Platform
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike ā a C++ tool for ethical hacking and Red Team operations.
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Sandman is a NTP based backdoor for hardened networks.
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.
UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Uā¦