Lists (32)
Sort Name ascending (A-Z)
✅ Already tested
☁️ AWS
🔵 blue team & detection
🌩️ Cloud
🗝️ Credentials/dump
🔒 Cryptography
🔹 DeFi
🐝 eBPF
eBPF related stuff📜 Enumeration
🧮 Framework
⭐ Fun
🔮 Future ideas
👻 Golang
golang utils❄️ k8s
📝 List/Cheat sheet
😷 Malware & Rootkit
📱 mobile
📡Network
👑NIM
🔎 OSINT
🎣 phishing & initial access
🧙♂️ PoC
🎦 Presentation & report
😶🌫️ Privacy
💪 Privesc & Persitence
🔴 Redteam (pentest)
🔙 Reverse engineering
🔬 scanner
🧪 To test
🛠️ Utils
🌐 Web
🪟windows
Stars
Guidelines and training material to write secure smart contracts
Parallelized, coverage-guided, mutational Solidity smart contract fuzzing, powered by go-ethereum
🔴🟡🟢 The Amazing Multipurpose Policy Engine (and L)
Send files and folders anywhere in the world without storing in cloud - any size, any format, no accounts, no restrictions.
AirPods liberated from Apple's ecosystem.
Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox
[Support 0.49.x](Reset Cursor AI MachineID & Bypass Higher Token Limit) Cursor Ai ,自动重置机器ID , 免费升级使用Pro功能: You've reached your trial request limit. / Too many free trial accounts used on this machi…
🐸💬 - a deep learning toolkit for Text-to-Speech, battle-tested in research and production
user.js -- Firefox configuration hardening
🪆 Go library to quickly build CLI using a simple one-liner (Struct-based argument parsing)
#1 PDF Application on GitHub that lets you edit PDFs on any device anywhere
PairDrop: Transfer Files Cross-Platform. No Setup, No Signup.
aider is AI pair programming in your terminal
View HTTP/HTTPS requests made by any Linux program
A collection of awesome security hardening guides, tools and other resources
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Track personal Bluetooth devices via Apple's "Find My" network using OpenHaystack and Macless-Haystack with tools written in Go/TinyGo. No Apple hardware required!
🌱 a fast, batteries-included static-site generator that transforms Markdown content into fully functional websites
An easy 1-click way to create beautiful artwork on your PC using AI, with no tech knowledge. Provides a browser UI for generating images from text prompts and images. Just enter your text prompt, a…
Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
Send Morse code via ⏮️ ⏸️ ⏯️
Interact with Hackthebox using your terminal - Be faster and more competitive !