- Dallas texas
Highlights
- Pro
Lists (31)
Sort Name ascending (A-Z)
2mfa
Attack Surface
AZURE/AWS
chatGPT
Compliance
DataScience
DevSecOPS
Discord threatbot
Exploit development
Graphql
ICR
Incident Control Reponse
Incident Control Response
Install
Install Kits
Knowledge
MACOS
Malware Research
Mfa
NMAP
Notion
OSINT
OSX
Pentest
Phishing
Reports
Resource monitor
Secviz
SIEM
Vulnerability Assessment
WebDevSec
Stars
- All languages
- ASP.NET
- Assembly
- Astro
- Batchfile
- C
- C#
- C++
- CSS
- Dart
- Dockerfile
- Elixir
- Fluent
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Makefile
- Meson
- Nim
- Nunjucks
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Puppet
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Solidity
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- VBScript
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zig
Get up and running with Kimi-K2.5, GLM-5, MiniMax, DeepSeek, gpt-oss, Qwen, Gemma and other models.
Xray, Penetrates Everything. Also the best v2ray-core. Where the magic happens. An open platform for various uses.
Easily and securely send things from one computer to another 🐊 📦
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
Go language library for reading and writing Microsoft Excel™ (XLAM / XLSM / XLSX / XLTM / XLTX) spreadsheets
An open-source, AI-integrated, cross-platform terminal for seamless workflows
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Information gathering framework for phone numbers
Easy and fast file sharing from the command-line.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
In-depth attack surface mapping and asset discovery
cheat allows you to create and view interactive cheatsheets on the command-line. It was designed to help remind *nix system administrators of options for commands that they use frequently, but not …
🐠 Beats - Lightweight shippers for Elasticsearch & Logstash
An organizer for your porn, written in Go. Documentation: https://docs.stashapp.cc
Karpenter is a Kubernetes Node Autoscaler built for flexibility, performance, and simplicity.
🎩 simple, fun and transparent SSH (and telnet) bastion server
DetectDee: Hunt down social media accounts by username, email or phone across social networks.
RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.
A toolkit to attack Office365
A unique technique to execute binaries from a password protected zip