🚀 Containerize and deploy applications in Kubernetes while testing resilience with chaos engineering in this hands-on workshop for 2025.
-
Updated
Jan 1, 2026
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
🚀 Containerize and deploy applications in Kubernetes while testing resilience with chaos engineering in this hands-on workshop for 2025.
🎯 Enhance code quality with cursor-rules, a tailored set of review guidelines for the Cursor editor, ensuring consistent and efficient collaboration.
This Python tool is a powerful Facebook account verification tool used to check Facebook profiles and save checked accounts to .txt file.
GitHub Account Creator is a Python tool that enables automatic account creation on GitHub. Automatically generating your credentials, the script quickly creates a new account.
Asset discovery and identification tools rapidly identify web fingerprint information and pinpoint asset types.
Retrieve server or domain controller login logs
The Janssen Project is a home for open source IAM components, featuring Auth Server (OAuth/OpenID), Agama low-code identity orchestration, and the Cedarling policy decision point. The "Janssen Server" distributions bundle IAM components under one control plane.
It is an automated Python virtual machine escape payload skipping framework that helps security researchers discover viable payload variants under strict character blacklist restrictions.
Sleepy-Duck is an open source project created for automated security testing on application level.
Sqlinfo is a fast and efficient database information detection tool designed to quickly gather key details about database environments,
🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
🛡️ Ensure AI safety with hai-guardrails, offering enterprise-grade solutions in just a few lines of code for secure AI deployment.
An automated mirror of malicious IP addresses from packetsdatabase.com, providing continuously updated blocklists and security feeds in multiple formats.
🔒 Secure your web applications with essential security practices and guides for SSL, server configuration, authentication, and data protection.
🛡️ Detect and remediate cloud security misconfigurations in real-time with a Generative AI-powered assistant for safer digital environments.
🛡️ Explore ethical hacking techniques to strengthen your cybersecurity skills and protect against threats in the digital landscape.
DBeaver Database Password Decryption Tool
SunloginLPE is a local verification and analysis tool designed to help researchers Sunlogin command execution vulnerability in a controlled
🔒 Build secure and reliable server environments with PsychopompOS, a Debian-based GNU/Linux distribution tailored for cybersecurity operations.
Code scanning at ludicrous speed. Find bugs and reachable dependency vulnerabilities. Enforce standards on every commit
Find, fix (and prevent!) known vulnerabilities in your code
GuardRails provides continuous security feedback for modern development teams
Automated GitHub backups so you can recover fast, stay compliant, and never lose a line of code
Dependency Automation service by Mend.io
Backup repositories, metadata and LFS into AWS, Azure, OneDrive, GCP. SOC2 Type II compliant. Pay per repositories, not seats
World's most tech-savvy GitHub backup, recovery, restore, migration & config management trusted by Fortune 500
Developer-first security platform that protects your code from both vulnerable and malicious dependencies
We help developers write clean code
Runtime Code Review
Detect open source vulnerabilities in real time with suggested fixes for quick remediation