Python
Noisy - Generate Random HTTP/ DNS Traffic noise to make your Data Unsellable
Enhance Privacy: Generate Random HTTP/DNS Traffic Noise with Python
Python
Enhance Privacy: Generate Random HTTP/DNS Traffic Noise with Python
CCTV
Viseron is an open-source self-hosted CCTV and local-first NVR solution with AI-powered computer vision support. It comes with amazing powerful features as Object detection, motion detection, face recognition, image classification, and supports hardware acceleration. Key features * Object Detection: YOLOv3/v4/v7 (OpenCV), Tensorflow (Google Coral EdgeTPU), CodeProject.AI * Motion Detection
privacy
Imagine you're at a fancy restaurant. You don't talk directly to the chefs in the kitchen, right? Instead, there's a waiter who takes your order, delivers it to the kitchen, and brings back your food. That waiter is like a reverse proxy in the
Cybersecurity
Vuls is an open-source, agentless vulnerability scanner designed to help administrators and security professionals, like pentesters, keep their systems secure. It’s written in Go, known for its lightweight and high-performance capabilities. Vuls provides a proactive way to detect vulnerabilities without needing to install any agents on the target systems,
WordPress
WordPress is a versatile and widely-used content management system (CMS) that powers over 75 million websites worldwide, making it a popular choice for businesses, bloggers, and e-commerce platforms alike. Its user-friendly interface and extensive customization options through themes and plugins have contributed to its immense popularity. However, with great power
web spider
Wapiti is a free and open-source web application vulnerability scanner that enables users to assess the security of their applications, including WordPress sites. It performs security audits by analyzing web applications for vulnerabilities, such as SQL injection, Cross-Site Scripting (XSS), and file disclosure issues. Wapiti works as a "black-box&
dns
DNSCrypt is a protocol that encrypts, authenticates and optionally anonymizes communications between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses cryptographic signatures to verify that responses originate from the chosen DNS resolver and haven’t been tampered with. It is an open specification, with free
Cybersecurity
Nginx is a popular open-source server that runs most of the websites, web apps and services on the internet nowadays. However, bad configuration can leave your website vulnerable to hackers. Some may use some Nginx dashboards and UI tools for better and easier system configuration, you may read about them
Android
Block malware, spyware, ads, and trackers across all apps with Rethink DNS. Servers in 300+ locations: Experience Blazing fast speeds.
Cybersecurity
What is MQTT (Message Queuing Telemetry Transport)? MQTT (Message Queuing Telemetry Transport) is an OASIS standard messaging protocol specifically designed for the Internet of Things (IoT). Its lightweight architecture is perfect for connecting remote devices that have limited resources and minimal network bandwidth. This makes MQTT an ideal choice across
pentesting
PRET is a security testing tool for printers, developed at Ruhr University Bochum. It connects to printers via network or USB and exploits PostScript, PJL, and PCL languages to manipulate print jobs, access the printer’s file system, and potentially cause physical damage. By translating UNIX-like commands into printer language,
Open Source Intelligence (OSINT)
SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate. SpiderFoot has an embedded web-server for providing a clean and intuitive web-based interface but can also be
Cybersecurity
In the ever-evolving landscape of cybersecurity, professionals face an increasing number of threats that require robust solutions. Offensive Security practices play a crucial role in identifying and mitigating vulnerabilities before they can be exploited. Docker, a powerful containerization platform, has emerged as a favorite among cybersecurity experts for its ability
macos
A firewall app monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between trusted and untrusted networks, blocking unauthorized access while allowing legitimate communication, thereby enhancing the overall security of devices and networks. Do you need a firewall on macOS? what
Docker
Is Your Docker Deployment Secure? Docker containers have revolutionized the way applications are deployed and managed, but with great flexibility comes the need for heightened security vigilance. Regularly checking your Docker containers is crucial to ensure they are configured correctly and free from vulnerabilities. Misconfiguration can expose your applications to
Cybersecurity
HuntKit is a collection of [penetration testing, bug bounty hunting, capture the flag, red teaming] tools in a single Docker image. Simply run the image and start using the tools. Its modular architecture allows users to customize their workflows and leverage a range of hunting techniques, enhancing the efficiency of
Android
With over 11 million Android devices affected by malware, protecting your device is more important than ever. Android’s open nature makes it a popular target for cybercriminals who exploit vulnerabilities to access your data, steal personal information, or install malicious software. A reliable malware scanner can help detect and
CCTV
While there are many commercial and open-source CCTV systems available for home and business security, many people are unaware that these systems also require security testing. This is crucial to ensure that no unauthorized users have logged in or are accessing unsecured CCTV camera feeds. Best 20 Free Open-source CCTV,
Linux
System monitors are essential tools for tracking system performance and resource usage in real time. They provide insights into CPU, memory, disk, and network activity, helping users manage both personal and server environments effectively. This is crucial for optimizing performance, troubleshooting issues, and ensuring the smooth operation of applications. Many
CCTV
This open-source project allows you to run a complete multi-CCTV system on your Linux, Raspberry Pi, Windows or macOS systems without any fee. Designed in Java, it runs on any Java-enabled system, ensuring broad compatibility. It supports multiple admins, many cameras, recording as it comes with a built-in NVR and
Self-hosted
Sn1per is a free powerful open-source reconnaissance tool designed for penetration testing. It automates the process of gathering information about a target, helping security professionals identify vulnerabilities. With an array of features, Sn1per enhances your ability to perform comprehensive assessments effectively. It comes with two editions, an open-source free edition
WordPress
WordPress powers over 40% of all websites on the internet, making it a popular target for hackers. Failing to upgrade your WordPress installation and regularly check for security bugs in included packages is not just a risky move; it's a bad practice that can lead to severe security
CCTV
Build your own home Raspberry Pi-powered surveillance IoT camera with Face recognition, access your live feed from any device
Cybersecurity
WhatWeb is a web technology identification and scanner tool that answers the question, "What is that Website?" It recognizes over 1800 web technologies, including CMS, analytics packages, and JavaScript libraries. WhatWeb operates with adjustable aggression levels, allowing users to balance speed and reliability. The default 'stealthy'