Stars
Collection of Cyber Threat Intelligence sources from the deep and dark web
An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Claude) with comprehensive security testing modules for automat…
Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
Self-hosted YouTube downloader built on Material Design
Touchscreen ESP32‑S3 controller and load cell for precise coffee dosing.
Deployrr automates Homelab setup using Docker and Docker Compose. Below you will find more information its features and what it can/cannot do.
VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN or Wireguard, DNS over TLS, with a few proxy servers built-in.
A general purpose HTTP reverse proxy and forwarding tool. Now written in Go!
A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.
Containers for running the Greenbone Vulnerability Manager. Run as a single container with all services or separate single applications containers via docker-compose.
A feature-rich command-line audio/video downloader
An alternative privacy-friendly YouTube frontend which is efficient by design.
FULL Augment Code, Claude Code, Cluely, CodeBuddy, Comet, Cursor, Devin AI, Junie, Kiro, Leap.new, Lovable, Manus Agent Tools, NotionAI, Orchids.app, Perplexity, Poke, Qoder, Replit, Same.dev, Trae…
Docmost is an open-source collaborative wiki and documentation software. It is an open-source alternative to Confluence and Notion.
Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Automated CIS Benchmark Compliance Remediation for Ubuntu 22 with Ansible
Comfortably monitor your Internet traffic 🕵️♂️
Prowler is the Open Cloud Security for AWS, Azure, GCP, Kubernetes, M365 and more. As agent-less, it helps for continuous monitoring, security assessments & audits, incident response, compliance, h…
A simple and easy-to-use OIDC provider that allows users to authenticate with their passkeys to your services.
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
Accurately Locate Smartphones using Social Engineering
A simple threat modeling tool to help humans to reduce time-to-value when threat modeling
VMC: a Scalable, Open Source and Free Vulnerability Management Platform
A curated list of Awesome Threat Intelligence resources
Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
A one-of-a-kind resume builder that keeps your privacy in mind. Completely secure, customizable, portable, open-source and free forever. Try it out today!