Stars
Методические материалы по разработке процессора архитектуры RISC-V
GoodbyeDPI — Deep Packet Inspection circumvention utility (for Windows)
CTF framework and exploit development library
Клиент для показа текущих треков из любых источников в Discord RPC. Для поиска используется Yandex Music
Protect and discover secrets using Gitleaks 🔑
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Creates CycloneDX Bill of Materials (BOM) for your projects from source and container images. Supports many languages and package managers. Integrate in your CI/CD pipeline with automatic submissio…
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
njsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.
Program for determining types of files for Windows, Linux and MacOS.
A Broken Application - Very Vulnerable!
DevSecOps, ASPM, Vulnerability Management. All on one platform.
CLI tool and library for generating a Software Bill of Materials from container images and filesystems
Master programming by recreating your favorite technologies from scratch.
A Collection of application ideas which can be used to improve your coding skills.
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Reverse Engineering and Malware Analysis Roadmap
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
DevSecOps Assessment Framework
Exploitation Framework for Embedded Devices
A code editor made with Godot. Code has never been more lit!
Rewrite of the popular wireless network auditor, "wifite"
A list of useful payloads and bypass for Web Application Security and Pentest/CTF