Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers for image mimetype validation and much more.
β19Feb 15, 2025Updated last year
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β29Nov 26, 2025Updated 4 months ago
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)β126Sep 6, 2025Updated 7 months ago
- one-stop resource for all things offensive security.β179Feb 21, 2026Updated last month
- eBPF Memory Dump Toolβ103Apr 2, 2026Updated last week
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behaviorβ53Feb 16, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of scripts designed to secure/harden Linux based distributionsβ12Nov 2, 2025Updated 5 months ago
- Secure Code Review AI Agent (SeCoRA) - AI SASTβ55Jan 29, 2025Updated last year
- A framework for backdooring Microsoft Nuget packages.β10Jan 9, 2024Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offerβ¦β373Apr 6, 2024Updated 2 years ago
- Steganography Tool for JPG Imagesβ65Apr 1, 2026Updated last week
- A tool for folks who `git clone` first and ask questions laterβ67Sep 12, 2025Updated 6 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for preβ¦β51Nov 16, 2024Updated last year
- Misery Loader to bypass modern EDR solutionsβ15Dec 20, 2024Updated last year
- π Simplify and Supercharge Your Links!β17Mar 31, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptioβ¦β20Mar 22, 2026Updated 2 weeks ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackeβ¦β79Feb 7, 2026Updated 2 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs andβ¦β162Nov 21, 2024Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.β138May 7, 2025Updated 11 months ago
- IDA helper plugin to reverse engineer Objective-C codeβ44Jun 12, 2025Updated 9 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ46Aug 5, 2025Updated 8 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β78Sep 1, 2025Updated 7 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, dependeβ¦β16Aug 29, 2025Updated 7 months ago
- β23Mar 4, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An IAM Simulator that outputs detailed explains of how a request was evaluated.β101Updated this week
- io_uring based rootkitβ250Apr 24, 2025Updated 11 months ago
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights β¦β118Updated this week
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type deteβ¦β66Feb 23, 2026Updated last month
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Compβ¦β35May 27, 2025Updated 10 months ago
- NextJs Project for SuperPay powered by Coinbase Developer Platform (CDP)β20Apr 8, 2025Updated last year
- A simple program to automate Microsoft OAuth device code phishing attacks.β19Feb 15, 2024Updated 2 years ago
- A full insecure kubernetes application for testing security toolsβ94Mar 28, 2026Updated last week
- Toolkit for creating cryptographic figures and videos.β35May 17, 2024Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- β25Jun 2, 2025Updated 10 months ago
- An index of publicly available and open-source threat detection rulesets.β130Apr 17, 2025Updated 11 months ago
- OpenShield is a new generation security layer for AI modelsβ85Feb 2, 2026Updated 2 months ago
- This is a simple Telegram bot with interface to Firefly III to process and store simple transactions.β14Sep 3, 2021Updated 4 years ago
- Red Kite, the Extensible Attack Surface Management tool.β89Feb 8, 2026Updated 2 months ago
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact proβ¦β522Updated this week
- Use npm's Arborist to get a dependency tree for a package.β14Mar 16, 2026Updated 3 weeks ago