Pocket Pentester — A Native Offensive Security Toolkit That Fits in Your Pocket
TL;DR I built Pocket Pentester — a native offensive security toolkit for Android. 21 modules, 34MB APK, no root, full...
Continue ReadingA place for my project and my thought , this web or blog is build from scratch using NodeJS
0xchasercat/mochi is a library for faithful browser automation that generates a single deterministic fingerprint from a (profile, seed) pair and routes every request through the Chromium engine. It ta...
Continue Readingnisten/shaiscan is a single POSIX shell script that passively scans for the Mini Shai-Hulud worm (CVE-2026-45321) using ripgrep. It requires no extra dependencies beyond awk, find, and grep, works on ...
Continue ReadingAnansi is a web scraper built on the premise that websites are inherently hostile and unstable, and instead of requiring constant maintenance when layouts change or bot detection kicks in, the tool sh...
Continue ReadingThe saudi-legal-ai-framework tackles a specific blind spot in modern AI assistants. Large language models are predominantly trained on Western legal corpora, which means they often misapply concepts w...
Continue ReadingMost attempts to keep an AI on track during long sessions lean on memory stores or retrieval pipelines. Tools like mem0 or Claude's built-in memory capture facts about you and hope the model consults ...
Continue ReadingSecurity professionals and developers often struggle to bridge the gap between theoretical knowledge of web application vulnerabilities and practical exploitation techniques. Understanding how individ...
Continue ReadingThis project emerges for teams seeking a flexible, self-hosted solution to craft internal dashboards and admin interfaces without relying on external vendors. At its core, Appsmith addresses a clear p...
Continue ReadingThis project introduces an alternative open-source firmware tailored for ESP8266 and ESP32 devices, aiming to simplify the development process for IoT applications. From the README, it stands out by o...
Continue ReadingMQTT has become the de facto messaging protocol for constrained devices — sensors, home automation controllers, embedded systems where bandwidth and processing power are limited. When you need a messa...
Continue ReadingLog4Shell,formally known as CVE-2021-44228, remains one of the most infamous vulnerabilities in modern software history. Exploited by cybercriminals for months after its disclosure, it leveraged a fla...
Continue Reading