- Australia 🇦🇺
Lists (32)
Sort Name ascending (A-Z)
AI-Agents & Orchestration
Agent frameworks, tool-use, planners.Automotive & CAN
OBD-II, CAN/UDS, fuzzing.Blue-Team & Detection
SIEM rules, detections, IDS/IPS, SOC.Cloud & Infra as Code
Terraform, Pulumi, CDK, modules.Containers & Orchestration
Docker, Kubernetes, operators.Crypto/Key/Secrets Security
Crypto, secret scanners, vault/KMS.Data Eng & Pipelines
ETL, streaming, lakehouse.DFIR & Forensics
Disk, memory, timeline forensics; triage.Embedded Systems & Firmware
MCU SDKs, HALs, bootloaders.Frontend & UI Toolkits
React/TS components, visualization.GIS & Geospatial
OSM, routing, mapping.Hardware Interfaces & JTAG/SWD
Probes, debuggers, boundary scan.IoT Security
IoT attack/defense, MQTT/CoAP security.Languages & Build Systems
Compilers, interpreters, build tools.LLM Apps & Tooling
LLM apps, prompt/RAG kits, chat UIs.Misc / Unclassified
Fallback for ambiguous/low-confidence repos.ML/AI Frameworks & Training
PyTorch/TF, training/eval libs.MLOps & Model Serving
Serving, gateways, tracing, metrics.Networking & Proxies
Proxies, DPI, LB, VPN.NLP/Embedding/RAG Infra
Vector DBs, chunkers, rerankers.Observability & SRE
Logging, tracing, metrics, chaos.Offensive Tooling
Exploits, payload generators, scanners, fuzzers.OSINT & Recon
Recon frameworks, scrapers, link analysis.Post-Exploitation & C2
Privilege escalation, lateral movement, persistence, C2.Privacy/Anonymity & TOR
Privacy tooling and Tor ecosystem.Red-Team & Adversary Emulation
Frameworks/toolkits for adversary simulation and attack emulation.Reverse Engineering (Bin/Firmwar
Binary/firmware analysis: Ghidra/IDA, decompilers.RL / Simulation
Reinforcement learning, gym envs, simulators.SDR & RF Tooling
SDR pipelines, spectrum analysis, GNU Radio.Security DevOps (DevSecOps)
SAST/DAST, SBOM, supply chain.Vision & CV Pipelines
CV pipelines, OCR, segmentation.Web/AppSec (Offensive)
Offensive web vulnerability tooling.- All languages
- ANTLR
- API Blueprint
- ASP
- Arduino
- Assembly
- Batchfile
- Boogie
- C
- C#
- C++
- CMake
- CSS
- Clojure
- Crystal
- Cuda
- Dart
- Dockerfile
- EJS
- Eagle
- Elixir
- Elm
- Emacs Lisp
- GDB
- Go
- Groovy
- HTML
- Hack
- Handlebars
- Haskell
- IGOR Pro
- JSON
- Java
- JavaScript
- Julia
- Jupyter Notebook
- KiCad Layout
- Kotlin
- LLVM
- Lua
- MATLAB
- MDX
- MQL5
- Makefile
- Markdown
- Max
- Mojo
- Nim
- OCaml
- Objective-C
- Objective-C++
- OpenEdge ABL
- PHP
- PLpgSQL
- Pascal
- Perl
- PostScript
- PowerShell
- Pug
- Python
- QML
- R
- Roff
- Ruby
- Rust
- SCSS
- Sage
- Scala
- Shell
- Smali
- Solidity
- Svelte
- SystemVerilog
- Tcl
- TeX
- TypeScript
- VBScript
- VHDL
- Verilog
- Vim Script
- Visual Basic .NET
- Vue
- YAML
- YARA
- Zig
Starred repositories
JavaScript API for Chrome and Firefox
Educational framework exploring ergonomic, lightweight multi-agent orchestration. Managed by OpenAI Solution team.
Open-source framework for developing real-time multimodal conversational AI agents.
🌐 Make websites accessible for AI agents. Automate tasks online with ease.
Open-Source Memory Engine for LLMs, AI Agents & Multi-Agent Systems
🚀 EvoAgentX: Building a Self-Evolving Ecosystem of AI Agents
Build effective agents using Model Context Protocol and simple workflow patterns
PraisonAI is a production-ready Multi AI Agents framework, designed to create AI Agents to automate and solve problems ranging from simple tasks to complex challenges. It provides a low-code soluti…
RuoYi AI 是一个全栈式 AI 开发平台,旨在帮助开发者快速构建和部署个性化的 AI 应用。
Build Real-Time Knowledge Graphs for AI Agents
AI Native Data App Development framework with AWEL(Agentic Workflow Expression Language) and Agents
Kortix – build, manage and train AI Agents. Fully Open Source.
Python SDK for Agent AI Observability, Monitoring and Evaluation Framework. Includes features like agent, llm and tools tracing, debugging multi-agentic system, self-hosted dashboard and advanced a…
This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.
"DeepCode: Open Agentic Coding (Paper2Code & Text2Web & Text2Backend)"
Bypass WAF locks when you perform scans with nmap
Execute a DoS attack by changing the IP address every 10 seconds to bypass WAF bans.
Tool to hack the KIA Automotive Infotainment Console that use iRTOS
Tool to automatize captcha process to perform a brute force attack
A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC bypass techniques to gain unauthorized access.
The RF Automotive tool allow you to unlock cars
MapAnything: Universal Feed-Forward Metric 3D Reconstruction