NeTracker is a kernel-level network traffic tracker built with eBPF. It monitors and analyzes network activity directly within the Linux kernel, leveraging the power of eBPF for efficient and precise traffic inspection.
Mar 17, 2025
The Zed Attack Proxy (ZAP) by Checkmarx is the world’s most widely used web app scanner. Free and open source. A community based GitHub Top 1000 project that anyone can contribute to. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It’s also a great tool for experienced pentesters to use for manual security testing.
Jan 25, 2025
The OWASP CRS is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.
Jan 20, 2025
NetPulse is a basic comprehensive network scanner. It combines multiple features such as host discovery, port scanning, service detection, vulnerability detection, OS detection, banner grabbing, and logging into a single, easy-to-use tool.
Jul 1, 2024
WebCrawlZ is a simple web crawler tool that scans a website for all anchor (<a>) tags and prints their href attributes. It is built using Python and utilizes the requests, BeautifulSoup, and fake-useragent libraries for web scraping and user agent spoofing.
Oct 26, 2023
This script is designed to exploit a vulnerability in web applications using PHP version 8.1.0-dev. It should only be used on systems where you have explicit permission to test and exploit vulnerabilities.
Oct 26, 2023
Jaluma is a prototype of an app to help people who always forget to eat, or to give recommendation of nearest cheap restaurants.
Dec 1, 2022
This is a DDOS program, fully written in Java.
Jul 21, 2022
FunLocker is a password-locked file decryptor (so far only have .docx and .pdf file decryptors). FunLocker uses a set of base passwords provided by the user to attempt to unlock encrypted files. The program will generate various combinations of these passwords to maximize the chances of successfully decrypting the file. This is useful if you have a list of possible passwords that you commonly use and need to recover access to a file that has been encrypted with one of these passwords.
Jan 1, 0001