Applications
A collection of self-hosted applications, web-based tools, and GUI software for infrastructure management, monitoring, and productivity.
Authentication
5 appsVaultwarden
Password ManagerUnofficial Bitwarden server written in Rust (lightweight). Self-hosted password management with full Bitwarden client compatibility and minimal resource requirements.
HashiCorp Vault
VaultSecure, store and tightly control access to secrets. Enterprise-grade secrets management with dynamic credentials, encryption as a service, and audit logging.
Authelia
SSO/2FASingle sign-on and 2FA portal for web applications. Add authentication layer to reverse proxies with support for TOTP, WebAuthn, and push notifications.
Keycloak
IAMOpen source identity and access management. Full-featured IAM solution with SSO, social login, user federation, and fine-grained authorization.
Authentik
SSO/2FAAuthentication and authorization server with web UI. Modern identity provider supporting SAML, OAuth2, LDAP with intuitive admin interface.
Backup
4 appsRestic
DeduplicationFast, secure, efficient backup program with encryption. Deduplicating backups to local or cloud storage with client-side encryption and cross-platform support.
Borg Backup
DeduplicationDeduplicating archiver with compression and encryption. Space-efficient backups with authenticated encryption and optional remote repository support.
Kopia
EncryptionFast and secure open-source backup/restore tool. Modern backup solution with web UI, snapshot policies, and support for many storage backends.
Duplicati
Cloud BackupStore encrypted backups in the cloud. Web-based backup solution with scheduling, incremental backups, and support for 20+ cloud providers.
Container Management
3 appsPortainer
Docker UILightweight management UI for Docker/Kubernetes. Intuitive web interface for managing containers, images, networks, and volumes across multiple environments.
Dockge
Docker ComposeSelf-hosted Docker Compose stack manager. Clean web UI for managing docker-compose.yaml files with real-time container logs and status.
Yacht
Docker UIWeb interface for managing Docker containers. Template-based container deployment with app store functionality for easy self-hosting.
DNS Security
3 appsPi-hole
DNS FilteringNetwork-wide ad blocking via DNS. Self-hosted DNS sinkhole that blocks ads, trackers, and malware domains for all devices on your network.
AdGuard Home
DNS FilteringNetwork-wide ads and trackers blocking DNS server. Modern alternative to Pi-hole with DNS-over-HTTPS, DNS-over-TLS, and parental controls.
Blocky
DNS ProxyFast and lightweight DNS proxy with ad-blocking. Container-friendly DNS server with group-based filtering and Prometheus metrics.
Documentation
4 appsOutline
Knowledge BaseFastest wiki and knowledge base for teams. Beautiful, real-time collaborative wiki with Slack integration and markdown support.
Trilium Notes
Note TakingBuild your personal knowledge base with hierarchical notes. Powerful note-taking app with scripting, cloning, and end-to-end encryption.
WikiJS
WikiModern and powerful wiki application. Feature-rich wiki with multiple editors, authentication providers, and search engines.
BookStack
WikiSimple, self-hosted platform for organising documentation. Intuitive book/chapter/page hierarchy with WYSIWYG and markdown editing.
Home Automation
4 appsESPHome
IoT FirmwareESP8266/ESP32 configuration and firmware platform. Create custom IoT devices using simple YAML configuration with Home Assistant integration.
Node-RED
Flow AutomationFlow-based programming for event-driven applications. Visual automation tool connecting APIs, hardware, and services with drag-and-drop nodes.
Zigbee2MQTT
Zigbee BridgeZigbee to MQTT bridge for smart home devices. Control Zigbee devices from any MQTT-enabled platform without vendor cloud dependencies.
Frigate
NVRNVR with real-time local object detection for IP cameras. AI-powered security camera system with person/vehicle detection using Google Coral.
Infrastructure
6 appsTraefik
ProxyCloud native application proxy and load balancer. Automatic service discovery with Let's Encrypt, Docker, and Kubernetes integration.
Caddy
Reverse ProxyFast web server with automatic HTTPS. Zero-configuration TLS with automatic certificate management and simple Caddyfile syntax.
HAProxy
Load BalancerReliable, high performance TCP/HTTP load balancer. Industry-standard load balancer with advanced health checking and traffic management.
Nginx Proxy Manager
Proxy ManagementDocker-based Nginx reverse proxy with web UI. Easy SSL certificate management and proxy host configuration through intuitive interface.
NetBox Docker
IPAM/DCIMDocker Image of NetBox network documentation and management. Infrastructure resource modeling for IP addresses, racks, devices, and circuits.
Smallstep
Certificate AuthorityPrivate certificate authority and related tools. Run your own PKI for internal services with ACME support and short-lived certificates.
Malware Analysis
4 appsGhidra
Reverse EngineeringSoftware reverse engineering framework. NSA's powerful disassembler and decompiler with collaborative analysis features and extensible plugin architecture.
IDA Pro
Reverse EngineeringPowerful disassembler, decompiler and debugger. Industry-standard reverse engineering tool with advanced analysis capabilities and plugin ecosystem.
Cuckoo Sandbox
SandboxAutomated malware analysis system. Submit suspicious files for dynamic analysis with behavioral reports, network traffic capture, and memory analysis.
Wireshark
Network AnalysisNetwork protocol analyzer. Deep inspection of hundreds of protocols with live capture and offline analysis for network troubleshooting and security analysis.
Monitoring
5 appsPrometheus
MetricsSystems monitoring and alerting toolkit. Pull-based metrics collection with powerful query language, alerting, and extensive exporter ecosystem.
Grafana
VisualizationOpen platform for analytics and monitoring. Beautiful dashboards with support for multiple data sources and extensive visualization options.
Uptime Kuma
Uptime MonitoringSelf-hosted monitoring tool like Uptime Robot. Monitor HTTP, TCP, DNS, and more with notifications to Slack, Telegram, Discord, and others.
LibreNMS
SNMPAuto-discovering network monitoring and alerting platform. Full-featured network monitoring with SNMP polling, alerting, and extensive device support.
Observium
Network ObservationLow-maintenance auto-discovering network monitoring platform. Autodiscovery, automatic graphing, and intuitive interface for network monitoring.
Reference
10 appsHackTricks
CTF & PentestingCompilation of tricks/techniques for CTFs and pentesting. Comprehensive reference covering exploitation, privilege escalation, and security testing methodologies.
GTFOBins
Unix BinariesCurated list of Unix binaries that can bypass security restrictions. Essential reference for privilege escalation through legitimate system utilities.
The Book of Secret Knowledge
Cheat SheetsCollection of inspiring lists, manuals, cheatsheets, blogs, hacks. Massive curated collection of security and sysadmin resources.
DevOps Exercises
DevOps LearningLinux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, K8s exercises. Interview prep and learning resource with practical exercises.
The Art of Command Line
Command LineMaster the command line in one page. Essential tips and tricks for becoming proficient in terminal usage across platforms.
Awesome Security Hardening
Hardening GuidesCollection of security hardening guides, tools and resources. Comprehensive list covering OS, network, and application hardening.
Awesome AppSec
Application SecurityCurated list of resources for learning application security. Books, courses, tools, and resources for secure software development.
Awesome OSINT
OSINTCurated list of amazingly awesome OSINT resources. Tools, techniques, and resources for open source intelligence gathering.
Container Security Checklist
Container SecurityChecklist for container security - DevSecOps practices. Comprehensive security checklist for Docker and Kubernetes deployments.
Persistence Info
Windows PersistenceWindows persistence techniques documentation. Reference for understanding and detecting persistence mechanisms used by attackers.
Security Testing
4 appsBurp Suite
Web TestingWeb application security testing platform. Industry-standard proxy tool for intercepting, analyzing, and modifying HTTP traffic with automated scanning.
OWASP ZAP
WebWeb application security scanner. Free and open-source alternative to Burp Suite with active scanning, API testing, and CI/CD integration.
Postman
API TestingAPI development and testing platform. Comprehensive tool for API testing, documentation, and collaboration with automated testing capabilities.
Insomnia
API TestingAPI client for REST and GraphQL. Open-source alternative to Postman with environment management and request chaining.
SIEM
3 appsWazuh
XDR/SIEMOpen source unified XDR and SIEM protection. Complete security platform with log analysis, intrusion detection, vulnerability assessment, and compliance monitoring.
Graylog
Log ManagementFree and open source log management platform. Centralized log collection, processing, and analysis with powerful search and alerting.
Elastic Security
Security AnalyticsSIEM and endpoint security built on Elastic Stack. Threat detection, investigation, and response with machine learning and prebuilt detections.
Training Platforms
8 appsHack the Box
CTFOnline platform for penetration testing labs. Practice hacking skills on realistic vulnerable machines with guided learning paths and certifications.
TryHackMe
CTFHands-on cyber security training platform. Beginner-friendly learning with guided rooms, browser-based attack boxes, and structured learning paths.
CTF Katana
CTF ToolkitAutomatic CTF challenge solver in Python. Framework for automating common CTF tasks with plugins for crypto, stego, forensics, and web challenges.
Over the Wire
WargamesLearn and practice security concepts through games. Progressive wargames teaching Linux, networking, and security fundamentals through hands-on challenges.
PwnAble
CTFWargame site for exploitation challenges. Binary exploitation and system security challenges ranging from beginner to advanced difficulty.
Pentester Lab
Web SecurityLearn penetration testing through hands-on exercises. Focused web security training with vulnerable applications and detailed explanations.
PicoCTF
CTFFree computer security education program with CTF. Beginner-friendly challenges covering forensics, cryptography, web exploitation, and reverse engineering.
CrackMe
Reverse EngineeringDownload crackmes to improve reverse engineering skills. Community-submitted challenges for practicing binary analysis and cracking techniques.
VPN
3 appsWireGuard
Modern VPNFast, modern, secure VPN tunnel. Extremely simple and fast VPN with state-of-the-art cryptography and minimal attack surface.
Headscale
Tailscale ControllerOpen source self-hosted Tailscale control server. Run your own coordination server for Tailscale mesh VPN without vendor dependency.
NetBird
Zero-Trust NetworkWireGuard-based mesh network. Connect devices into single private network with SSO integration and zero-trust network access.