Stars
Persistent remote applications for X11; screen sharing for X11, MacOS and MSWindows.
A modular graph-based Retrieval-Augmented Generation (RAG) system
Differential testing framework for HTTP implementations
High-performance In-browser LLM Inference Engine
Deobfuscate Javascript code using ChatGPT
Prettier is an opinionated code formatter.
Deobfuscate obfuscator.io, unminify and unpack bundled javascript
This is the Rust course used by the Android team at Google. It provides you the material to quickly teach Rust.
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
World’s single largest Internet domains dataset
Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego
Kubernetes RBAC static analysis & visualisation tool
Low-level unprivileged sandboxing tool used by Flatpak and similar projects
A free, open-source Java library for automata learning algorithms
Gel supercharges Postgres with a modern data model, graph queries, Auth & AI solutions, and much more.
Grammar-based HTTP/1 fuzzer with mutation ability
JMSDigger is JMS API basedEnterprise Messaging Application assessment tool
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…
C library for prototyping and experimenting with quantum-resistant cryptography
Build p2p collaborative applications without any server infrastructure in Node.js
A JSON-like data structure (a CRDT) that can be modified concurrently by different users, and merged again automatically.
Understand adversary tradecraft and improve detection strategies