TorghostNG : Make All Your Internet Traffic Anonymized With Tor Network

5 years ago

TorghostNG will make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3. Rewritten from TorGhost…

Why Some Canon Printers Are More Effective Than Others

5 years ago

Not all printers are created equal and that is as true when it comes to comparing printers from the same…

SSHPrank : A Fast SSH Mass-Scanner, Login Cracker & Banner Grabber

5 years ago

SSHPrank is a fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module. Usage Notes…

Generator Burp Extension : Everything You Need About

5 years ago

When you generate your plugin project, the generator will ask you what features should be included in your plugin. If…

Parsec Cloud : Secure Cloud Framework

5 years ago

Parsec is a free software (AGPL v3) aiming at easily share your work and data in the cloud in total…

Invoker : Penetration Testing Utility

5 years ago

Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features…

Authelia : The Single Sign-On Multi-Factor Portal For Web Apps

5 years ago

Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a…

Ossem Power Up : Tool To Assess Data Quality

5 years ago

Ossem Power Up is a tool to assess data quality, built on top of the awesome OSSEM project. Mission Answer…

Klar : Integration Of Clair And Docker Registry

5 years ago

Klar is a simple tool to analyze images stored in a private or public Docker registry for security vulnerabilities using…

Top 3 Open-Source Software Security Concerns and How to Mitigate Them

5 years ago

The term open-source refers to code that is made publicly available for scrutiny, modification, and distribution. It is typically made…