Lists (7)
Sort Newest
Stars
A binary ninja plugin that finds format string vulnerabilities
Collection of CTF-focused courses
My Favorite Offensive Security Scripts
Also known by Microsoft as Knifecoat 🌶️
Stylish, intuitive and user-friendly prompts, for Node.js. Used by eslint, webpack, yarn, pm2, pnpm, RedwoodJS, FactorJS, salesforce, Cypress, Google Lighthouse, Generate, tencent cloudbase, lint-s…
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
All Algorithms implemented in Python
CybGPT is at the forefront of integrating OpenAI's advanced GPT technology with the complex landscape of cybersecurity.
Python SDK, Proxy Server (LLM Gateway) to call 100+ LLM APIs in OpenAI format - [Bedrock, Azure, OpenAI, VertexAI, Cohere, Anthropic, Sagemaker, HuggingFace, Replicate, Groq]
CTF Archives: Collection of CTF Challenges.
Algorithm and data structure articles for https://cp-algorithms.com (based on http://e-maxx.ru)
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
This project aims to maintain Wappalyzer technologies
A pentest reporting tool written in Python. Free yourself from Microsoft Word.
A recursive internet scanner for hackers.
A Node.js CLI that uses Ollama and LM Studio models (Llava, Gemma, Llama etc.) to intelligently rename files by their contents
Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
E-mails, subdomains and names Harvester - OSINT
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
DieHard: An error-resistant memory allocator for Windows, Linux, and Mac OS X
A pip wrapper around our ridiculous amount of qemu forks.
Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.
Driller: augmenting AFL with symbolic execution!
A repository for learning various heap exploitation techniques.