Lists (3)
Sort Name ascending (A-Z)
Stars
A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representations in Go.
The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a cloud environment.
My attempt at making a GPT agent for pentesting
Automated Penetration Testing Agentic Framework Powered by Large Language Models
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Security technique research and some funny work on it !
GitHub 泄露监控系统(GitHub Sensitive Information Leakage Monitor Spider)
Infection Monkey - An open-source adversary emulation platform
Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.
The one-liner to spin up a code search engine
本文介绍的是利用学生、教职工身份可以享受到的相关学生优惠、教育优惠或教师优惠的权益,但也希望各位享受权利的同时不要忘记自己的义务,不要售卖、转手自己的学生优惠、教育优惠的资格,使得其他同学无法受益。
The fastest path to AI-powered full stack observability, even for lean teams.
Windows Internals Book 7th edition Tools
PICO processes toolbox, playground for PICO processes research
Fun with the Windows Subsystem for Linux (WSL/LXSS)
Alfred workflow for opening a folder with VS Code
Program for determining types of files for Windows, Linux and MacOS.
CTF framework and exploit development library
PEDA - Python Exploit Development Assistance for GDB
Encoding and decoding a string into multiple variations.
Java Dockerfile for trusted automated Docker builds.