Stars
21 Lessons, Get Started Building with Generative AI
12 Lessons to Get Started Building AI Agents
An open-source cross-platform alternative to AirDrop
Home Assistant Touch Panel Kiosk application for a Linux device (e.g. Raspberry Pi) with Touch Display.
Welcome to the Ollama Docker Compose Setup! This project simplifies the deployment of Ollama using Docker Compose, making it easy to run Ollama with all its dependencies in a containerized environment
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…
An awesome list of self-sovereign identity resources.
Crawl a site to generate knowledge files to create your own custom GPT from a URL
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for m…
Created an optimised pipeline to provide accurate data for analysis, then used snowsight (provided by Snowflake) to create a dashboard.
Portio Hugo is a simple, minimal and responsive Portfolio Hugo Theme. Portio Hugo is well organized, well-formatted, and named accordingly so it’s easy to change any and all of the design. Portio i…
Gray box end-to-end testing and automation framework for mobile apps
The 1Password Connect Kubernetes Operator provides the ability to integrate Kubernetes Secrets with 1Password. The operator also handles autorestarting deployments when 1Password items are updated.
Analytic Hierarchy Process (AHP) Tool
A library for building applications in a consistent and understandable way, with composition, testing, and ergonomics in mind.
The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb
🚀 A hand-curated list of free, open, and developer-friendly APIs
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell
Trojan Source: Invisible Vulnerabilities
GraphQL for Java with Spring Boot made easy.
Example of Kotlin multiplatform project