Highlights
- Pro
Lists (9)
Sort Name ascending (A-Z)
Starred repositories
UnlimCloud provides unlimited cloud storage for your files, utilizing Telegram as the storage solution. Simply log in using your Telegram ID, and you are good to go.
Claude Code is an agentic coding tool that lives in your terminal, understands your codebase, and helps you code faster by executing routine tasks, explaining complex code, and handling git workflo…
The Open-Source Multimodal AI Agent Stack: Connecting Cutting-Edge AI Models and Agent Infra
Rigorously evaluating autonomous systems for cybersecurity at scale
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security teste…
Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebooks, Docker environment, and CTF challenges.
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
"DeepTutor: AI-Powered Personalized Learning Assistant"
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
JWT Auditor – Analyze, break, and understand your tokens like a pro.
RAG on Everything with LEANN. Enjoy 97% storage savings while running a fast, accurate, and 100% private RAG application on your personal device.
Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.
🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast. Precise. Effective.
Production-ready implementation of InvisPose - a revolutionary WiFi-based dense human pose estimation system that enables real-time full-body tracking through walls using commodity mesh routers
Source code for the X Recommendation Algorithm
best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect
NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive security operations. Leveraging the capabilities of large langua…
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Agentic SOC Platform: A powerful, flexible, open-source, and agent-centric automated security operations platform
A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.
evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).
A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
OCR model that handles complex tables, forms, handwriting with full layout.
EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, contextual analysis, and multi-backend AI integration.