Lists (23)
Sort Name ascending (A-Z)
DATABAZY_REST_API
databazy, postgresql, mysql, rest api, všetko ohladne databazEXPLOITATIONS_SHELL_SQL_XSS_INJE
HACKING
MACHINE_LEARNING
MARKETING_SEO
METASPLOIT_COBALT_BURP_SUITE
MOBILY_ANDROID_IOS
mobilne aplikacie, automatizacia, testovanie, vyvoj vsetko k mobilom -android, iosOSINT_NASTROJE_NAVODY_TOOLS
PISHING
POST_EXPLOATACION
r
RAT_STEALERS_BOTNETS_MINERS
RED_TEAM_NAVODY_NASTROJE
rez
ROZNE_METODY_NAVODY
ROZNE_NEZARADENE
SECURITY_NASTROJE_BLUE_TEAM
firewally, wap, vulner_apps,SKENOVACIE_NASTROJE
SOCIALNE_SIETE
FACEBOOK_INSTAGRAM_REDDIT_TWITTERSTATIC_DYNAMIC_ANALYZE_WEB
trtee
WEB_STRANKY_NASTROJE
rozne nastroje pre webstranky, website buidersWORKFLOW_AUTOMATION
- All languages
- Assembly
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CSS
- Clojure
- Crystal
- Dart
- Dockerfile
- EJS
- Go
- Go Template
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Makefile
- Nim
- Nix
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- Raku
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Smarty
- Starlark
- Swift
- TypeScript
- Visual Basic
- Visual Basic .NET
- Vue
- YAML
- YARA
- Zig
Starred repositories
lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection
A Better Secrets Scanner built for configurability and speed
A Simple and Universal Swarm Intelligence Engine, Predicting Anything. 简洁通用的群体智能引擎,预测万物
Red Team Tips as posted by @vysecurity on Twitter
Project for generating and identifying deceptive LNK files.
A cyber security toolkit blending manual testing with AI Agents
Fluffy-Barnacle - Disposable, ephemeral network infrastructure powered by GitHub Codespaces.
Android Phone Control With Qwen3-VL
🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast. Precise. Effective.
High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential validation.
Fully undetectable and evasive ransomware written in Rust, leveraging a BYOVD technique to disable AV/EDR solutions on the infected systems.
Your browser catches homograph attacks. Your terminal doesn't. Tirith guards the gate and intercepts suspicious URLs, ANSI injection, and pipe-to-shell attacks before they execute.
Fully automatic censorship removal for language models
An AI-powered agentic red team framework that automates offensive security operations, from reconnaissance to exploitation to post-exploitation, with zero human intervention.
The open-source voice synthesis studio
Collection of extracted System Prompts from popular chatbots like ChatGPT, Claude & Gemini
Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞
Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vectors, and executes real exploits to prove vulnerabilities bef…
A Claude Code plugin that automatically captures everything Claude does during your coding sessions, compresses it with AI (using Claude's agent-sdk), and injects relevant context back into future …
DiskCryptor Open Source full disk encryption tool
Run iOS apps without actually installing them!
an open source, extensible AI agent that goes beyond code suggestions - install, execute, edit, and test with any LLM
📑 PageIndex: Document Index for Vectorless, Reasoning-based RAG
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.