Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
It is a compliance-focused pentesting-as-a-service platform. It allows companies to easily schedule and manage penetration tests, designed for both compliance and security enhancement. | It is an open-source Java application for network communication proxying for the purpose of penetration testing. It allows penetration testers to set up proxies and interceptors to manage the traffic transmitted between client and server. |
Keeping you secure all year round;
Maps attack surface;
Monitors threats;
Depth when you need it | TCP proxy with SSL/TLS support;
UDP proxy
|
Statistics | |
GitHub Stars - | GitHub Stars 219 |
GitHub Forks - | GitHub Forks 21 |
Stacks 1 | Stacks 0 |
Followers 2 | Followers 0 |
Votes 0 | Votes 0 |
Integrations | |
| No integrations available | |

BitResurrector v3.0 is a high-performance suite for recovering lost Bitcoin private keys. It leverages extreme GPU acceleration, AVX-512 parallelism, and cryptographic optimizations like Montgomery REDC. Built for "Digital Archaeology," it specializes in auditing historical PRNG weaknesses and statistical anomalies in early blockchain assets.

An open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.

The only self-service scanner with active adversarial probing for AI endpoints. 12 Parallel Security Checks get your results in less than a minute. No agents. No SDK. No credentials required. Paste a URL, get a security score with actionable findings.

Autonomous AI security agents that run nonstop pentests to protect your websites, APIs and cloud infrastructure.
RedVeil offers on-demand penetration testing powered by agentic AI. Uncover vulnerabilities and get actionable at a fraction of traditional costs.
Secuditor Lite is a free diagnostic security tool with a friendly GUI for Windows endpoints and networks. It helps identify system vulnerabilities, improve device Operational Security (OPSEC), detect network elements, and generate structured audit reports, all in one place. Suitable for both personal and organizational environments.

You built the app. We'll find the holes. One audit, one payment — no security knowledge required. Free quick scan, $29 deep audit.

Find security vulnerabilities in your Replit, Bolt, Lovable, Cursor, and v0 projects. 40+ parallel scanner engines, risk scoring A+ to F, SARIF/CSV/PDF reports, and CI/CD integration.

The only security scanner built for vibe coders. Scan your Lovable.dev, Bolt.new - Supabase and Cursor apps for vulnerabilities in one click. Ship fast. Ship secure.

ZeroThreat.ai is an AI-powered web application and API pentesting platform designed to identify real, exploitable vulnerabilities—not just surface-level findings. Built for modern engineering teams, it combines Agentic AI pentesting with a high-performance scanning engine to deliver up to 10× faster, deeply validated security testing. Unlike traditional DAST tools that rely on static signatures and generate excessive noise, ZeroThreat.ai executes adaptive, attacker-style workflows that evolve based on application behavior. Its interpreter-driven vulnerability intelligence continuously ingests emerging threats and newly disclosed CVEs, enabling near real-time detection updates and rapid CVE-to-exploit mapping. The platform supports over 100,000 vulnerability checks, including native Nuclei template execution, and extends beyond known issues with zero-day detection through behavioral pattern analysis. It validates every finding through live exploit execution, ensuring only real, impactful vulnerabilities are reported—with clear proof of risk and exposed data. ZeroThreat.ai is purpose-built for modern applications, with advanced browser automation for SPAs, authenticated testing, and complex multi-step workflows. It identifies critical issues such as auth bypass, business logic flaws, and workflow abuse that traditional scanners miss.