MCP Server (Rad Security)
The RAD Security MCP Server is an MCP server that provides AI-powered security insights for Kubernetes and cloud environments. It integrates with the RAD Secur
Enter
E.System.Security
E.System.Security is an actively developed library for .NET that simplifies integrating your microservices with a Service Mesh and provides enterprise-grade se
Enter
Web Security Basics
Web Security Basics is a beginner-friendly review of essential web security concepts that equips web developers with foundational knowledge about protecting ap
Enter
Security VMS
Features: Intuitive, Responsive and Resource-effective . This is an application that can also be fetched from https: //sourceforge.net/projects/security-vms/.
Enter
SCAP Security Guide
The purpose of this project is to create security policy content for various platforms, Red Hat Enterprise Linux, Fedora, Ubuntu, Debian, SUSE Linux Enterprise
Enter
Symfony Security Core
Part of the Symfony framework, the Security Core component provides the foundational tools for managing authentication, authorization, and access control in PH
Enter
Spring Security
Spring Security is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applic
Enter
spring-security-jwt-guide
This project is a comprehensive example repository that demonstrates how to secure a Spring Boot application using Spring Security and JSON Web Tokens (JWT). I
Enter
OWASP Find Security Bugs
The SpotBugs plugin for security audits of Java web applications. Find Security Bugs is the SpotBugs plugin for security audits of Java web applications. It ca
Enter
Claude Code Security Review
The claude-code-security-review repository implements a GitHub Action that uses Claude (via the Anthropic API) to perform semantic security audits of code chan
Enter
Symfony Security Bundle
Symfony Security Bundle is a powerful tool for adding authentication and authorization to Symfony applications. It provides mechanisms for managing user roles,
Enter
Agentic Security
The open-source Agentic LLM Vulnerability Scanner. Features: Customizable Rule Sets or Agent based attacksDocumentation availableExamples availableComprehensiv
Enter
FMSec - File Manager Security
FMSec (File Manager SECurity) is a set of extensions to file managers that enable some security-related operations to be easily performed. The operations are:
Enter
Code Quality and Security for Java
Hundreds of unique rules to find Java bugs, code smells & vulnerabilities. Sonar static analysis helps you build and maintain high-quality Java code. Cover
Enter
KubeArmor
KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, a
Enter
Prowler
Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening, and fo
Enter
Mythril
Mythril is a security analysis tool for EVM bytecode. It detects security vulnerabilities in smart contracts built for Ethereum, Hedera, Quorum, Vechain, Roost
Enter
Cloud Scanner of Death
Cloud Scanner of Death is a professional-grade cloud security assessment tool designed to identify vulnerabilities, misconfigurations, and compliance issues ac
Enter
Tracee
Tracee is a runtime security and observability tool that helps you understand how your system and applications behave. It is using eBPF technology to tap into
Enter
Windows Defender Remover
This is a command?line tool and executable that fully disables or removes Microsoft Defender and associated Windows security components. It disables the Window
Enter
Tsunami
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. When s
Enter
Arkime
Arkime is an open source, large-scale, full packet capturing, indexing, and database system designed to augment existing security infrastructure by storing and
Enter
Custom Erase Algorithm by Mariano Ortu
This project provides a secure file deletion algorithm designed to permanently erase data by overwriting files with customizable patterns. It ensures that dele
Enter
OSCAL
NIST is developing the Open Security Controls Assessment Language (OSCAL), a set of hierarchical, XML-, JSON-, and YAML-based formats that provide a standardiz
Enter
Algo VPN
Introducing Algo, a self-hosted personal VPN server designed for ease of deployment and security. Algo automatically deploys an on-demand VPN service in the cl
Enter
Infosec Reference
Infosec Reference is a curated knowledge base and resource repository for information security practitioners. It aggregates cheat sheets, tooling guides, proto
Enter
Sploitware
Sploitware is a curated repository that maps the world of exploit development, offensive security, and binary exploitation into organized learning material. It
Enter
firejail
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces a
Enter
PentestAgent
PentestAgent is an open-source autonomous security testing platform designed to help organizations identify vulnerabilities and assess security posture by simu
Enter
Simple Event Correlator
Simple Event Correlator (SEC) is a lightweight event correlator for network management, log file monitoring, security management, fraud detection, and other ta
Enter
Is Website Vulnerable
A command-line tool that scans websites for known security vulnerabilities in their frontend dependencies by checking against the Snyk vulnerability database.
Enter
fleet
Fleet exposes familiar concepts from traditional MDMs like custom attributes and dynamic grouping, but in a way that lets you work directly with data and event
Enter
EMBA
EMBA is designed as the central firmware analysis tool for penetration testers and product security teams. It supports the complete security analysis process s
Enter
Vault
Manage secrets and protect sensitive data. Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets
Enter
CodeQL
CodeQL is a semantic code analysis engine that treats programs as queryable databases, enabling users to write expressive queries that identify security vulner
Enter
GuardDog
guarddog is an open-source security tool by DataDog designed to detect risks in open-source dependencies. It helps developers analyze software supply chain ris
Enter
XRAY
XRAY is a modular security toolset that helps developers and security professionals analyze, fuzz, and test web applications, protocols, and network services f
Enter
OWASP Amass
The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset d
Enter
Paseto
Paseto (Platform-Agnostic Security Tokens) is an open-source security token format designed as a more secure alternative to JWT (JSON Web Tokens). Unlike JWT,
Enter
Laravel CSP
By default, all scripts on a webpage are allowed to send and fetch data to any site they want. This can be a security problem. Imagine one of your JavaScript d
Enter
Digital Signer (a PDF Signing software)
Digital Signer is a powerful and user-friendly software designed to secure and authenticate your digital documents with ease. Ideal for individuals, businesses
Enter
SSH-MITM
ssh man-in-the-middle (ssh-mitm) server for security audits supporting publickey authentication, session hijacking and file manipulation. SSH-MITM is a man in
Enter
Sec-Context
Sec-Context is a curated security research project that distills common code anti-patterns and vulnerabilities that generative AI tends to produce, presenting
Enter
Wazuh
Wazuh is an open-source, unified security platform that delivers extended detection and response (XDR) and SIEM capabilities for on-premises, cloud, container,
Enter
Tailsnitch
tailsnitch is a security auditing tool for Tailscale networks (tailnets) that scans configurations and device setups to detect risky or overly permissive setti
Enter
AWS EKS Terraform module
Terraform module which creates AWS EKS (Kubernetes) resources. Windows-based node support is limited to a default user data template that is provided due to th
Enter
url-checker-php-sdk
The EmailVeritas URL Checker PHP SDK provides real-time phishing and malicious link detection through the official EmailVeritas API. It enables developers to c
Enter
Nebular
Nebular is a customizable Angular UI library that contains 40+ UI components, four visual themes, and Auth and Security modules. Recognized at the prestigious
Enter
Lighthouse Ethereum
Lighthouse is an Ethereum consensus client that connects to other Ethereum consensus clients to form a resilient and decentralized proof-of-stake blockchain. L
Enter
thc-hydra
Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and s
Enter
Spring Boot Demo
This repository is a hands-on, �deep learning by doing� collection of Spring Boot demos that you can run and study module by module. It currently includes 66 p
Enter
Trivy Operator
The Trivy Operator leverages Trivy to continuously scan your Kubernetes cluster for security issues. The scans are summarised in security reports as Kubernetes
Enter
Sigma
Welcome to the Sigma main rule repository. The place where detection engineers, threat hunters and all defensive security practitioners collaborate on detectio
Enter
Falco
Falco is a open source project to detect abnormal application behavior in a cloud native environment like Kubernetes. This cloud native runtime security projec
Enter
BrowserBox
Remote isolated browser API for security, automation visibility and interactivity. Run-on our cloud, or bring your own. Full scope double reverse web proxy wit
Enter
nuclei
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuc
Enter
HexStrike AI MCP Agents
HexStrike AI is an MCP server that lets LLM agents autonomously operate a large catalog of offensive-security tools. Its goal is to bridge �language models� an
Enter
bearer
Welcome to the Bearer documentation. Bearer is a static application security testing (SAST) tool that scans your source code and analyzes your data flows to di
Enter
NPQ
npq is a security-focused package manager that analyzes npm dependencies for potential vulnerabilities before installation. It helps developers ensure the safe
Enter
Trail of Bits Skills Marketplace
Trail of Bits Skills Marketplace is a specialized Claude Code skills marketplace built by the security research firm Trail of Bits that focuses on enhancing AI
Enter
Go Safe Web
go-safeweb is a security-focused HTTP framework for Go that bakes in secure defaults so common web vulnerabilities are harder to introduce. Instead of leaving
Enter
Application Inspector
Microsoft Application Inspector is a software source code characterization tool that helps identify coding features of first or third party software components
Enter
Arcjet
Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common
Enter
Infection Monkey
Infection Monkey is a open source automated security testing tool for testing a network's security baseline. Monkey is a tool that infects machines and pro
Enter
Bandit
Bandit is a tool designed to find common security issues in Python code. To do this, Bandit processes each file, builds an AST from it, and runs appropriate pl
Enter
Zeek
Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name �Bro� as a means t
Enter
Passbolt API
Passbolt API is an open-source password manager designed for teams. It allows users to securely store and share passwords using end-to-end encryption. Passbolt
Enter
Mobile Verification Toolkit
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potentia
Enter
Lexik JWT Authentication Bundle
LexikJWTAuthenticationBundle is a Symfony bundle that provides JWT (JSON Web Token) authentication for RESTful APIs. It simplifies the process of generating an
Enter
Powerful files and text searcher
Last release: 29/7/2023. Enhanced program. The interface font size is big for ease of access. You can download source code that can be found in 'source cod
Enter
windows_hardening
This repository, also known as HardeningKitty, is a comprehensive Windows hardening checklist for personal and enterprise environments. It translates security
Enter
SafeBox
A free and Open-Source File Encryption and Decryption app with GUI (Graphical User Interface) and CLI (Command Line Interface) that help you to protect your pr
Enter
tirreno
tirreno is an open-source security framework. tirreno [tir.?r?.no] helps understand, monitor, and protect your product from threats, fraud, and abuse. While cl
Enter
Django Hijack
With Django Hijack, admins can log in and work on behalf of other users without having to know their credentials. 3.x docs are available in the docs folder. Th
Enter
SonarQube
SonarQube empowers all developers to write cleaner and safer code. Thousands of automated Static Code Analysis rules, protecting your app on multiple fronts, a
Enter
nebula
Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the wor
Enter
truffleHog
truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan
Enter
readpe
readpe (formerly known as pev) is a multiplatform toolkit to work with PE (Portable Executable) binaries. Its main goal is to provide feature-rich tools for pr
Enter
Lantern
Can't access your favorite apps? Download Lantern to easily access videos, messaging, and other popular apps while at school or work. Lantern is an applica
Enter
Rancher
From datacenter to cloud to edge, Rancher lets you deliver Kubernetes-as-a-Service. Rancher is a complete software stack for teams adopting containers. It addr
Enter
Wapiti
Wapiti is a vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execut
Enter
Ajv JSON schema validator
Security and reliability for JavaScript applications. Ensure your data is valid as soon as it's received. Instead of having your data validation and saniti
Enter
Heartbleed
Heartbleed contains a compact, purpose-built implementation for detecting the infamous Heartbleed vulnerability in OpenSSL�s TLS heartbeat extension (CVE-2014-
Enter
SpringBoot Labs
SpringBoot-Labs is a comprehensive learning and reference repository created by yudaocode that explores advanced concepts, features, and best practices in Spri
Enter
NextDNS
NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids,
Enter
Skill Scanner
This repository is a public security-focused scanning tool intended to analyze and assess AI agent skills for potential issues, quality concerns, and vulnerabi
Enter
CloudQuery
CloudQuery extracts, transforms and loads your cloud assets into normalized PostgreSQL tables. CloudQuery enables you to assess, audit, and monitor the configu
Enter
OmniEdge
OmniEdge is an Open source p2p layer 2 , zero-config mesh VPN infrastructure, a traditional VPN, AWS VPC, Ngrok, DDNS alternative. No central server, easy to s
Enter
SpringAll
SpringAll is a comprehensive learning project that gathers a wide range of Spring, Spring Boot, and Spring Cloud demos in one repository. It is designed for de
Enter
Single Web Page to Edit any MySQL table
Add a single web page to edit any mysql table. Just put in the DB credentials, the file handles the rest. Optionally: * Put the credentials in a secure /etc/ f
Enter
Al-Khaser
al-khaser is an open-source proof-of-concept security tool that deliberately implements techniques commonly used by real-world malware to test and evaluate the
Enter
LINKERD
Enterprise power without enterprise complexity. Linkerd adds security, observability, and reliability to any Kubernetes cluster. 100% open source, CNCF graduat
Enter
Awesome Stars
awesome-hacking-lists is a curated directory of penetration-testing tools and productivity utilities spanning multiple security domains. Curated lists across m
Enter
InQL Scanner
A security testing tool to facilitate GraphQL technology security auditing efforts. InQL can be used as a stand-alone script or as a Burp Suite extension. Sinc
Enter
Pterodactyl Panel
Pterodactyl� is a free, open-source game server management panel built with PHP, React, and Go. Designed with security in mind, Pterodactyl runs all game serve
Enter
Conscrypt
Conscrypt is a modern TLS/SSL provider for Java that replaces the default JCE/JCA crypto stack with one backed by BoringSSL for better performance and security
Enter
Domain Password Spray
DomainPasswordSpray is a focused security tool designed to perform enterprise-scale password spraying assessments against Active Directory environments. It aut
Enter
Cyber Ghost � Scanner
CyberGhost Code Scanner � Smart Malware Detection for Developers CyberGhost Code Scanner is a powerful, all-in-one executable tool designed for source code and
Enter
mimikatz
mimikatz is a tool that makes some "experiments" with Windows security. It's well-known to extract plaintexts passwords, hash, PIN code and kerbero
Enter
MaddCrypt
MaddCrypt is a simple application that focuses on protection, encryption, and obfuscation for dotNET application. Designed with high-end features, MaddCrypt ha
Enter
NGINX Admin�s Handbook
nginx-admins-handbook is a practical, in-depth guide for configuring, securing, and operating NGINX across real-world deployments. It distills years of researc
Enter
ProxyCrypt
ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to
Enter
koa-helmet
koa-helmet is a wrapper for helmet to work with koa. It provides important security headers to make your app more secure by default. Features: Usage is the sam
Enter
SHS VPN Client
VPN client for Small HTTP server Small HTTP server includes a VPN server that works on the https protocol. This is a client application for this server. Featur
Enter
ClamSAP
ClamSAP exists of two 'C' shared libraries which link between ClamAV and the Virus Scan Interface (VSI) of SAP (offical name: NW-VSI). A SAP applicatio
Enter
knokspack
**WP Site Suite is the only plugin you need to manage and supercharge your WordPress site.** Tired of juggling dozens of plugins for security, performance, mar
Enter
Stegcore
Stegcore is a crypto-stego application that carries out steganography using text cryptography and the least significant bit method to secure text data such as
Enter
Docker-OSX
Run Mac OS X in Docker with near-native performance! X11 Forwarding. iMessage security research! iPhone USB working! macOS in a Docker container. Features: Con
Enter
Authme
Features: Secure: Your codes is secured by AES 256bit encrypton and your own password.Import: You can directly import from Google Authenticator or from any 2FA
Enter
badpi-cyphering
encryption/decryption/key generation/CRC. You may use as a library (header *.hpp files) . Features: symetric key algorithmdifficult Cryptanalysiszero knowledge
Enter
Tutanota
Tutanota is an open source email client focused on security and privacy. It is built with end-to-end encryption and 2FA, so you can be assured of utmost email
Enter
tracecat
Tracecat is an open-source Tines / Splunk SOAR alternative for security engineers. We're building the features of Tines using enterprise-grade open-source
Enter
Coin Wallet
Coin Wallet is a non-custodial multicurrency wallet for multiple platforms. A secure, user-friendly cryptocurrency wallet focused on providing essential featur
Enter
Mega OS (Old Versions only)
Mega OS is an advanced operating system designed to provide a comprehensive and user-friendly computing experience. It incorporates a wide range of features an
Enter
encrypt
encrypt is a multi-platform, file encryption application. Binary packages are currently provided for Arch, Debian, Fedora, MS Windows, Android and OS X. For fu
Enter
wolfi
Unofficial community packages for Wolfi Linux This project provides APK packages for applications not yet available in the official Wolfi repositories, with fo
Enter
Mega OS (Global Version)
Mega OS is an advanced operating system designed to provide a comprehensive and user-friendly computing experience. It incorporates a wide range of features an
Enter
WhatWeb
WhatWeb is a Ruby-based web scanner for fingerprinting websites. It identifies CMS, server technologies, JavaScript frameworks, and other characteristics by an
Enter
Naeon
Naeon is a data encryption and sharding method designed to secure data in potentially untrusted off-site storage locations. It uses AES-256 encryption with a r
Enter
Cloudflare Worker JWT
cloudflare-worker-jwt is a JavaScript library for handling JSON Web Tokens (JWTs) inside Cloudflare Workers. It enables authentication, token validation, and s
Enter
Harness
Harness is a CI/CD platform (available as SaaS/On-prem) that automates build, test, and deployment workflows. It offers pipeline-as-code YAML definitions, AI-o
Enter
WPScan
WPScan is a black-box WordPress vulnerability scanner written in Ruby. It analyzes WordPress sites to identify outdated core, plugins, themes, exposed APIs, an
Enter
Namecoin Core
Namecoin Core is the reference implementation of Namecoin, a decentralized naming system based on the Bitcoin protocol. It allows users to register and manage
Enter
PrivateBin
PrivateBin is a minimalist, open-source online pastebin that allows users to securely share text data. It encrypts the content client-side, ensuring that no on
Enter
Wabe
Wabe is an open-source backend that allows you to create your own fully customizable backend in just a few minutes. It handles database access, automatic Graph
Enter
CrossC2 framework
Support CobaltStrike's security assessment of other platforms (Linux/MacOS/.), and include the development support of Unix post-penetration module. Feature
Enter
UltraSecure-Archiver
UltraSecure Archiver is a revolutionary file compression and encryption tool that combines cutting-edge compression algorithms with military-grade security. Bu
Enter
ScubaGear
ScubaGear is a PowerShell-based assessment tool developed by CISA to verify that Microsoft?365 tenant configuration aligns with Secure Cloud Business Applicati
Enter
ezXSS
ezXSS is an open-source XSS (Cross-Site Scripting) testing platform designed to help security researchers identify and collect XSS vulnerabilities. It acts as
Enter
ElAdmin
Eladmin is a modular, full-featured backend management system based on Spring Boot, Spring Security, JWT, and Vue.js. It provides a front-end and back-end sepa
Enter
VHR
VHR is a front-end/back-end separated human resources management system built with Spring Boot (back end) and Vue (front end), featuring common enterprise-leve
Enter
HPN-SSH
HPN-SSH is a series of performance patches for OpenSSH. By addressing network limitations and CPU limitations significant throughput performance can be realize
Enter
YubiKey Guide
The YubiKey-Guide by drduh is a community-maintained, in-depth tutorial and reference on how to use a YubiKey (hardware authentication token) with GPG, SSH, an
Enter
RustDesk
RustDesk is a full-featured open source remote control alternative for self-hosting and security with minimal configuration. Desktop versions use Flutter or Sc
Enter
HestiaCP
HestiaCP is an open-source web hosting control panel designed to manage web servers efficiently. It provides a simple and intuitive graphical interface to mana
Enter
TwitterOAuth
The most popular PHP library for use with the Twitter OAuth REST API. The recommended and easy as pie method is Composer. Setup require in your projects compos
Enter
GoofCord
Take control of your Discord experience with GoofCord, the highly configurable and privacy-focused Discord client. Privacy first: GoofCord blocks all tracking
Enter
Damn Vulnerable GraphQL Application
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Enter
LetoDMS
LetoDMS is an open-source, web-based document management system (DMS) written in PHP with a database backend. LetoDMS provides document meta-data, version cont
Enter
Google Node.js Datastore
Google�s Node.js Datastore client is a library for interacting with Google Cloud Datastore, a fully managed NoSQL database. It enables developers to store and
Enter
Authlib
The ultimate Python library in building OAuth and OpenID Connect servers. Various built-in high-level framework integrations for both clients and servers, aimi
Enter
Soap
A SOAP client and server for node.js. This module lets you connect to web services using SOAP. It also provides a server that allows you to run your own SOAP s
Enter
Password Pusher
Give your users the tools to be secure by default. Password Pusher is an open source application to communicate passwords over the web. Links to passwords expi
Enter
Hubble
Hubble is a fully distributed networking and security observability platform for cloud native workloads. It is built on top of Cilium and eBPF to enable deep v
Enter
accounts-js
Fullstack authentication and accounts-management for Javascript. Since accounts-js is very flexible, it can be used with multiple transports. For now we provid
Enter
React Native Auth0
With a few lines of code, you can have Auth0 integrated into any app written in any language, and any framework. We provide 30+ SDKs & Quickstarts to help
Enter
iDeal-DNS-Switcher
iDeal DNS Switcher is a simple desktop utility that allows you to switch between 16 free DNS providers at the click of a button. These providers have been sele
Enter
Zuul
Zuul is an L7 application gateway that offers many capabilities, including dynamic routing, monitoring, security, resiliency and more. It is used in the backen
Enter
Boulder
This is an implementation of an ACME-based CA. The ACME protocol allows the CA to automatically verify that an applicant for a certificate actually controls an
Enter
WAFW00F
The Web Application Firewall Fingerprinting Tool. Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. If that is
Enter
4gen
4gen is a secure, offline, lightweight password generator for windows packaged in hta. it offers cool features like mouse-movement entropy, full charset contro
Enter
Ring
This repo contains unofficial packages to enable interaction and automation with the majority of Ring products. The ring-client-API is a TypeScript package des
Enter
Ultramarker
Is a Windows (and Linux) based application that allows educators and assessors to design criteria based assessment rubrics. It specifically allows generic feed
Enter
Spree Commerce
Spree Commerce is a complete, free and open source e-commerce solution built with Ruby on Rails. It offers a modern, mobile-first UX, optional PWA frontend, RE
Enter
Decred
dcrd is the full-node implementation of Decred, a hybrid proof-of-work/proof-of-stake cryptocurrency focused on decentralized governance, long-term sustainabil
Enter
Parsedown
Parsedown is capable of escaping user-input within the HTML that it generates. Additionally Parsedown will apply sanitisation to additional scripting vectors (
Enter
Wfuzz
Wfuzz provides a framework to automate web applications security assessments and could help you to secure your web applications by finding and exploiting web a
Enter
Keycastr
KeyCastr requires access to the macOS Accessibility API in order to receive your key events and broadcast the keystrokes you are interested in. On newer versio
Enter
Authelia
Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security
Enter
express-openapi-validator
Auto-validates api requests, responses, and securities using ExpressJS and an OpenAPI 3.x specification. Express-openapi-validator is an unopinionated library
Enter
ZIO JSON
ZIO Json is a fast and secure JSON library with tight ZIO integration. The goal of this project is to create the best all-round JSON library for Scala. Extreme
Enter
1654 � encryption system
This release marks the first production-ready publication of 1654, a dependency-free cryptographic vault engine built around a strict vault abstraction and a w
Enter
Harbor
Harbor is an open-source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open-source Docker Distribution by add
Enter
Tarantool
In OLTP scenarios, Tarantool can be used instead of relational databases. Such a solution will work many times faster. With Tarantool, you can replace the trad
Enter
cert-manager
Automate certificate management in cloud native environments. Cert-manager builds on top of Kubernetes, introducing certificate authorities and certificates as
Enter
Step Certificates
Open Source step-ca provides the infrastructure, automations, and workflows to securely create and operate a private certificate authority. step-ca makes it ea
Enter
Fara-7B
Fara-7B is a Microsoft initiative aimed at bringing rigor, transparency, and structured evaluation to AI systems through automated and customizable assessment
Enter
Svix
Build a secure, reliable, and scalable webhook platform in minutes using the Svix webhook service. Webhooks require a lot more engineering time, resources and
Enter
Bottlerocket OS
Bottlerocket is a free and open-source Linux-based operating system meant for hosting containers. Bottlerocket focuses on security and maintainability, providi
Enter
s2n
s2n-tls is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority. It is released and licens
Enter
Wemake Django Template
What this project is all about? The main idea of this project is to provide a fully configured template for django projects, where code quality, testing, docum
Enter
Free-VPN
Secure your online privacy and browse the internet freely with our open-source completely free VPN software! Enjoy the benefits of a fast, reliable, and secure
Enter
Phish Alert / Report Button for Outlook
The Phish Alert Button for Outlook is a free add-in that allows users to report suspected phishing emails directly from their inbox with a single click. Once i
Enter
Betterfox
Betterfox is an opinionated configuration profile for Mozilla Firefox designed to improve everyday web browsing by making the browser faster, more private, and
Enter
Cerbos
Cerbos is an authorization layer that evolves with your product. It enables you to define powerful, context-aware access control rules for your application res
Enter
Open-Source auth provider
Add secure login and session management to your apps. SDKs available for popular languages and front-end frameworks e.g. Node.js, Go, Python, React.js, React N
Enter
Windows 11 Fixer
Windows 11 Fixer is a community-oriented Windows utility intended to centralize a wide range of customization, cleanup, and configuration tasks for Windows 11
Enter
OrientDB
OrientDB is an Open Source Multi-Model NoSQL DBMS with the support of Native Graphs, Documents, Full-Text search, Reactivity, Geo-Spatial and Object Oriented c
Enter
KubeLinter
KubeLinter analyzes Kubernetes YAML files and Helm charts, and checks them against a variety of best practices, with a focus on production readiness and securi
Enter
OpenSK
OpenSK is an open-source implementation of FIDO2 (WebAuthn + CTAP) security keys, written in Rust and designed to run on affordable microcontroller boards. It
Enter
IObit Uninstaller
IObit Uninstaller 15 Free is a powerful tool designed to completely remove unwanted software, Windows apps, and browser plug-ins for a cleaner, faster PC. It g
Enter
Windows 11 Guide
Windows 11 Guide is a comprehensive, single-repository handbook for setting up and tuning a Windows 11 (and often Windows 10) desktop for real day-to-day use,
Enter
DeployStack
DeployStack is an open-source framework that helps developers and teams define and deploy production infrastructure stacks using modular, reusable templates, o
Enter
Gate22
Gate22 is an open-source governance and control plane for Model Context Protocol (MCP) environments that helps teams define and enforce policies about which to
Enter
rep+
rep+ is a lightweight browser extension for Chrome DevTools that brings a Burp Suite-style HTTP repeater directly into the developer console, enhanced with bui
Enter
AWS Toolkit for JetBrains
The AWS Toolkit for JetBrains makes it easier to write applications built on Amazon Web Services. If you come across bugs with the toolkit or have feature requ
Enter
ClamAV
ClamAV is an open-source antivirus engine developed by Cisco Talos that provides cross-platform malware detection for servers, desktops, and mail systems. Orig
Enter
Dokploy
Streamline your operations with our all-in-one platform, perfect for managing projects, data, and system health with simplicity and efficiency. Simplify your p
Enter
AWS Agent Skills
AWS Agent Skills is a repository that curates AWS-focused agent skills � capability modules that give AI assistants like Claude Code and Codex deep, practical
Enter
Bitwarden Client Applications
Bitwarden client applications (web, browser extension, desktop, and cli). This repository houses all Bitwarden client applications except the mobile applicatio
Enter
CheckCle
CheckCle is a lightweight CLI tool focused on automating and measuring software project quality by running a variety of checks (linting, formatting, tests, typ
Enter
CredentialsGenerator
Secure your digital life with the Credential Generator from BLCKSNAKE IT SERVICES. This standalone Windows application is designed to provide you with a robust
Enter
Generation Password
GenerationPassword is a convenient and reliable application for creating highly secure passwords directly on your PC. It generates three unique passwords that
Enter
Brakeman
Brakeman is a free vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security i
Enter
react2shell-scanner
react2shell-scanner is a security-oriented tool that bridges modern JavaScript (React) applications and shell scripting by auditing web front-ends for exposed
Enter
ggshield
GitGuardian�s ggshield is an open-source command-line interface (CLI) tool designed to help developers and security teams detect hardcoded secrets and sensitiv
Enter
Osmedeus Core Engine
Osmedeus is a Workflow Engine for Offensive Security that allows you to build and run a reconnaissance system on a wide range of targets, including domains, UR
Enter
Shortcut Virus Removal Tool
Shortcut Virus Removal Tool Shortcut Virus Removal Tool is a powerful, portable, easy to use and safe program for fixing USB drives, external HDD / SSD drives
Enter
Optimizer
Advanced configuration utility that helps you restore your privacy and increase your security. Optimizer is recommended after a fresh, clean installation of Wi
Enter
dgs-framework
The DGS Framework (Domain Graph Service) is a GraphQL server framework for Spring Boot, developed by Netflix. Annotation based Spring Boot programming model. T
Enter