Stars
A collection of projects showcasing RAG, agents, workflows, and other AI use cases
The easiest, full-featured wireless router setup for Debian-based devices. Period.
PoC to coerce authentication from Windows hosts using MS-WSP
Deploy headless browsers in Docker. Run on our cloud or bring your own. Free for non-commercial uses.
🐬 A collection of awesome resources for the Flipper Zero device.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
KeySniffer device discovery tools and public advisories
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
A self-hosted, ad-free, privacy-respecting metasearch engine
A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
VMware vCenter 7.0.2.00100 unauth Arbitrary File Read + SSRF + Reflected XSS
SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as MISP.
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Open Cyber Threat Intelligence Platform
Attack Surface Management since before Attack Surface Management was a thing
IntelOwl: manage your Threat Intelligence at scale
Small and highly portable detection tests based on MITRE's ATT&CK.
A browser extension and API server for detecting corporate password use on external websites
The 30 Days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than 100 days. Follow your own pace. These vide…
🚀 The easiest way to get started with Electron
Build cross-platform desktop apps with JavaScript, HTML, and CSS