A Python script to check Next.js sites for corrupt middleware vulnerability (CVE-2025-29927). The corrupt middleware vulnerability allows an attacker to …


A Python script to check Next.js sites for corrupt middleware vulnerability (CVE-2025-29927). The corrupt middleware vulnerability allows an attacker to …

TL;DR: Galah (/ɡəˈlɑː/ – pronounced ‘guh-laa’) is an LLM (Large Language Model) powered web honeypot, currently compatible with the OpenAI …

Essential utilities for pentester, bug-bounty hunters and security researchers secbutler is a utility tool made for pentesters, bug-bounty hunters and …
The Next-gen Encryption Try temcrypt on the Web → Focused on protecting highly sensitive data, temcrypt is an advanced multi-layer …
TripleCross is a Linux eBPF rootkit that demonstrates the offensive capabilities of the eBPF technology. TripleCross is inspired by previous …
kubeaudit is a command line tool and a Go package to audit Kubernetes clusters for various different security concerns, such …
Emotet detection tool for Windows OS. How to use Download EmoCheck from the Releases page. Run EmoCheck on the host. …
Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a …
iOS Security Suite is an advanced and easy-to-use platform security & anti-tampering library written in pure Swift! If you …
wholeaked is a file-sharing tool that allows you to find the responsible person in case of a leakage. It’s written …