Stars
A Magisk/KernelSU module that automatically adds user certificates to the system root CA store
Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.
0x1Jar / dotfiles-zsh
Forked from tomnomnom/dotfiles.vimrc, with .zshrc
GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & more.
List of Google Dorks for sites that have responsible disclosure program / bug bounty program
(WIP) Runtime Application Instruments for iOS. Previously Passionfruit
Work in progress...
🌐 Make websites accessible for AI agents. Automate tasks online with ease.
Beautiful static documentation generator for OpenAPI/Swagger 2.0
GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Automatically install some web hacking/bug bounty tools.
NVIDIA Isaac GR00T N1.6 - A Foundation Model for Generalist Robots.
Pydoll is a library for automating chromium-based browsers without a WebDriver, offering realistic interactions.
Red Teaming Tactics and Techniques
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
List of Awesome Red Teaming Resources
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
📚 Freely available programming books
freeCodeCamp.org's open-source codebase and curriculum. Learn math, programming, and computer science for free.