Applications

A collection of self-hosted applications, web-based tools, and GUI software for infrastructure management, monitoring, and productivity.

Authentication

5 apps

Vaultwarden

Password Manager

Unofficial Bitwarden server written in Rust (lightweight). Self-hosted password management with full Bitwarden client compatibility and minimal resource requirements.

Secure, store and tightly control access to secrets. Enterprise-grade secrets management with dynamic credentials, encryption as a service, and audit logging.

Authelia

SSO/2FA

Single sign-on and 2FA portal for web applications. Add authentication layer to reverse proxies with support for TOTP, WebAuthn, and push notifications.

Keycloak

IAM

Open source identity and access management. Full-featured IAM solution with SSO, social login, user federation, and fine-grained authorization.

Authentik

SSO/2FA

Authentication and authorization server with web UI. Modern identity provider supporting SAML, OAuth2, LDAP with intuitive admin interface.

Backup

4 apps

Restic

Deduplication

Fast, secure, efficient backup program with encryption. Deduplicating backups to local or cloud storage with client-side encryption and cross-platform support.

Borg Backup

Deduplication

Deduplicating archiver with compression and encryption. Space-efficient backups with authenticated encryption and optional remote repository support.

Kopia

Encryption

Fast and secure open-source backup/restore tool. Modern backup solution with web UI, snapshot policies, and support for many storage backends.

Duplicati

Cloud Backup

Store encrypted backups in the cloud. Web-based backup solution with scheduling, incremental backups, and support for 20+ cloud providers.

Container Management

3 apps

Portainer

Docker UI

Lightweight management UI for Docker/Kubernetes. Intuitive web interface for managing containers, images, networks, and volumes across multiple environments.

Dockge

Docker Compose

Self-hosted Docker Compose stack manager. Clean web UI for managing docker-compose.yaml files with real-time container logs and status.

Yacht

Docker UI

Web interface for managing Docker containers. Template-based container deployment with app store functionality for easy self-hosting.

DNS Security

3 apps

Pi-hole

DNS Filtering

Network-wide ad blocking via DNS. Self-hosted DNS sinkhole that blocks ads, trackers, and malware domains for all devices on your network.

AdGuard Home

DNS Filtering

Network-wide ads and trackers blocking DNS server. Modern alternative to Pi-hole with DNS-over-HTTPS, DNS-over-TLS, and parental controls.

Blocky

DNS Proxy

Fast and lightweight DNS proxy with ad-blocking. Container-friendly DNS server with group-based filtering and Prometheus metrics.

Documentation

4 apps

Outline

Knowledge Base

Fastest wiki and knowledge base for teams. Beautiful, real-time collaborative wiki with Slack integration and markdown support.

Trilium Notes

Note Taking

Build your personal knowledge base with hierarchical notes. Powerful note-taking app with scripting, cloning, and end-to-end encryption.

WikiJS

Wiki

Modern and powerful wiki application. Feature-rich wiki with multiple editors, authentication providers, and search engines.

BookStack

Wiki

Simple, self-hosted platform for organising documentation. Intuitive book/chapter/page hierarchy with WYSIWYG and markdown editing.

Home Automation

4 apps

ESPHome

IoT Firmware

ESP8266/ESP32 configuration and firmware platform. Create custom IoT devices using simple YAML configuration with Home Assistant integration.

Node-RED

Flow Automation

Flow-based programming for event-driven applications. Visual automation tool connecting APIs, hardware, and services with drag-and-drop nodes.

Zigbee2MQTT

Zigbee Bridge

Zigbee to MQTT bridge for smart home devices. Control Zigbee devices from any MQTT-enabled platform without vendor cloud dependencies.

Frigate

NVR

NVR with real-time local object detection for IP cameras. AI-powered security camera system with person/vehicle detection using Google Coral.

Infrastructure

6 apps

Traefik

Proxy

Cloud native application proxy and load balancer. Automatic service discovery with Let's Encrypt, Docker, and Kubernetes integration.

Caddy

Reverse Proxy

Fast web server with automatic HTTPS. Zero-configuration TLS with automatic certificate management and simple Caddyfile syntax.

HAProxy

Load Balancer

Reliable, high performance TCP/HTTP load balancer. Industry-standard load balancer with advanced health checking and traffic management.

Nginx Proxy Manager

Proxy Management

Docker-based Nginx reverse proxy with web UI. Easy SSL certificate management and proxy host configuration through intuitive interface.

NetBox Docker

IPAM/DCIM

Docker Image of NetBox network documentation and management. Infrastructure resource modeling for IP addresses, racks, devices, and circuits.

Smallstep

Certificate Authority

Private certificate authority and related tools. Run your own PKI for internal services with ACME support and short-lived certificates.

Malware Analysis

4 apps

Ghidra

Reverse Engineering

Software reverse engineering framework. NSA's powerful disassembler and decompiler with collaborative analysis features and extensible plugin architecture.

IDA Pro

Reverse Engineering

Powerful disassembler, decompiler and debugger. Industry-standard reverse engineering tool with advanced analysis capabilities and plugin ecosystem.

Cuckoo Sandbox

Sandbox

Automated malware analysis system. Submit suspicious files for dynamic analysis with behavioral reports, network traffic capture, and memory analysis.

Wireshark

Network Analysis

Network protocol analyzer. Deep inspection of hundreds of protocols with live capture and offline analysis for network troubleshooting and security analysis.

Monitoring

5 apps

Prometheus

Metrics

Systems monitoring and alerting toolkit. Pull-based metrics collection with powerful query language, alerting, and extensive exporter ecosystem.

Grafana

Visualization

Open platform for analytics and monitoring. Beautiful dashboards with support for multiple data sources and extensive visualization options.

Uptime Kuma

Uptime Monitoring

Self-hosted monitoring tool like Uptime Robot. Monitor HTTP, TCP, DNS, and more with notifications to Slack, Telegram, Discord, and others.

LibreNMS

SNMP

Auto-discovering network monitoring and alerting platform. Full-featured network monitoring with SNMP polling, alerting, and extensive device support.

Observium

Network Observation

Low-maintenance auto-discovering network monitoring platform. Autodiscovery, automatic graphing, and intuitive interface for network monitoring.

Reference

10 apps

HackTricks

CTF & Pentesting

Compilation of tricks/techniques for CTFs and pentesting. Comprehensive reference covering exploitation, privilege escalation, and security testing methodologies.

GTFOBins

Unix Binaries

Curated list of Unix binaries that can bypass security restrictions. Essential reference for privilege escalation through legitimate system utilities.

Collection of inspiring lists, manuals, cheatsheets, blogs, hacks. Massive curated collection of security and sysadmin resources.

DevOps Exercises

DevOps Learning

Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, K8s exercises. Interview prep and learning resource with practical exercises.

Master the command line in one page. Essential tips and tricks for becoming proficient in terminal usage across platforms.

Awesome Security Hardening

Hardening Guides

Collection of security hardening guides, tools and resources. Comprehensive list covering OS, network, and application hardening.

Awesome AppSec

Application Security

Curated list of resources for learning application security. Books, courses, tools, and resources for secure software development.

Curated list of amazingly awesome OSINT resources. Tools, techniques, and resources for open source intelligence gathering.

Container Security Checklist

Container Security

Checklist for container security - DevSecOps practices. Comprehensive security checklist for Docker and Kubernetes deployments.

Persistence Info

Windows Persistence

Windows persistence techniques documentation. Reference for understanding and detecting persistence mechanisms used by attackers.

Security Testing

4 apps

Burp Suite

Web Testing

Web application security testing platform. Industry-standard proxy tool for intercepting, analyzing, and modifying HTTP traffic with automated scanning.

OWASP ZAP

Web

Web application security scanner. Free and open-source alternative to Burp Suite with active scanning, API testing, and CI/CD integration.

Postman

API Testing

API development and testing platform. Comprehensive tool for API testing, documentation, and collaboration with automated testing capabilities.

Insomnia

API Testing

API client for REST and GraphQL. Open-source alternative to Postman with environment management and request chaining.

SIEM

3 apps

Wazuh

XDR/SIEM

Open source unified XDR and SIEM protection. Complete security platform with log analysis, intrusion detection, vulnerability assessment, and compliance monitoring.

Graylog

Log Management

Free and open source log management platform. Centralized log collection, processing, and analysis with powerful search and alerting.

Elastic Security

Security Analytics

SIEM and endpoint security built on Elastic Stack. Threat detection, investigation, and response with machine learning and prebuilt detections.

Training Platforms

8 apps

Online platform for penetration testing labs. Practice hacking skills on realistic vulnerable machines with guided learning paths and certifications.

TryHackMe

CTF

Hands-on cyber security training platform. Beginner-friendly learning with guided rooms, browser-based attack boxes, and structured learning paths.

CTF Katana

CTF Toolkit

Automatic CTF challenge solver in Python. Framework for automating common CTF tasks with plugins for crypto, stego, forensics, and web challenges.

Over the Wire

Wargames

Learn and practice security concepts through games. Progressive wargames teaching Linux, networking, and security fundamentals through hands-on challenges.

PwnAble

CTF

Wargame site for exploitation challenges. Binary exploitation and system security challenges ranging from beginner to advanced difficulty.

Pentester Lab

Web Security

Learn penetration testing through hands-on exercises. Focused web security training with vulnerable applications and detailed explanations.

PicoCTF

CTF

Free computer security education program with CTF. Beginner-friendly challenges covering forensics, cryptography, web exploitation, and reverse engineering.

CrackMe

Reverse Engineering

Download crackmes to improve reverse engineering skills. Community-submitted challenges for practicing binary analysis and cracking techniques.

VPN

3 apps

WireGuard

Modern VPN

Fast, modern, secure VPN tunnel. Extremely simple and fast VPN with state-of-the-art cryptography and minimal attack surface.

Headscale

Tailscale Controller

Open source self-hosted Tailscale control server. Run your own coordination server for Tailscale mesh VPN without vendor dependency.

NetBird

Zero-Trust Network

WireGuard-based mesh network. Connect devices into single private network with SSO integration and zero-trust network access.