Starred repositories
A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT timing leak sensitive device-activity patterns. (WhatsApp /…
Explanation and full RCE PoC for CVE-2025-55182
The personal information dashboard for your terminal
Claude Desktop for Debian-based Linux distributions
Glances an Eye on your system. A top/htop alternative for GNU/Linux, BSD, Mac OS and Windows operating systems.
🔥 🔥 🔥 Open Source JIRA, Linear, Monday, and Asana Alternative. Plane helps you track your issues, epics, and cycles the easiest way on the planet.
A simple shell script that creates rootless podman containers to automate compilation/building of github projects, applications, kernels or any other task, while offering full integration with tmux…
Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
A tool for collecting publicly exposed network cameras, with support for specifying country and region.
An open-source remote desktop application designed for self-hosting, as an alternative to TeamViewer.
Interactive VCS-based todo-list for the command-line
a list of domains and ips that stay live in russia when the mobile internet gets "restricted"
Open-source AI agents for penetration testing
A TUI for reading logs from journald, auditd, file system, Docker containers, Compose stacks, Podman and Kubernetes pods with support for output coloring and multiple filtering modes.
Depix is a PoC for a technique to recover plaintext from pixelized screenshots.
DataSploit / datasploit
Forked from dvopsway/datasploitAn #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
Hunt for security weaknesses in Kubernetes clusters
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
A collection of awesome penetration testing resources, tools and other shiny things
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)
Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
KVM Backend for VirtualBox. With our current development model, we cannot easily accept pull requests here. If you'd like to contribute, feel free to reach out to us, we are happy to find a solution.
Streaming music player that finds free music for you
Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..