Lists (32)
Sort Name ascending (A-Z)
AD
Attack structure
Blue Team
breach tools
bug bounty
cissp studying
Cloud Hacking
cracking
CTF
DDOS
DevSecOps
Docker!
Hack tools
hacking guides
hacking resources
Mac Tools
malware
Network pwnage
O365/AAD
OSCP resources
password pwning
pivoting
post exp
powershell
privesc
RCE POC EXPLOITS
Reporting
Shells
Tunnelling
Vulnerability Scanning, enum
wapt tools
Winhacking
Stars
All Algorithms implemented in Python
A python script to check printer across the world that allow printing on port 9100 trough pjl
Small offensive network toolkit for Raspberry Pi (+ Waveshare 1.44″ LCD HAT) inspired by sharkjack fonctionnalities. For redteam and educational purposes only.
Model Context Protocol Servers
Reports from various areas of information security
Simple, unified interface to multiple Generative AI providers
An AI-powered file management tool that ensures privacy by organizing local texts, images. Using Llama3.2 3B and Llava v1.6 models with the Nexa SDK, it intuitively scans, restructures, and organiz…
The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices
The recursive internet scanner for hackers. 🧡
Scrapfly Python SDK for headless browsers and proxy rotation
A unified interface for distributed computing. Fugue executes SQL, Python, Pandas, and Polars code on Spark, Dask and Ray without any rewrites.
🤖 Chat with your SQL database 📊. Accurate Text-to-SQL Generation via LLMs using RAG 🔄.
RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry
C library for prototyping and experimenting with quantum-resistant cryptography
A utility for detecting webpage inputs and conducting XSS scans.
smbclient-ng, a fast and user friendly way to interact with SMB shares.
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.
Retrieval Augmented Generation (RAG) chatbot powered by Weaviate
AI modular structure that provides automation-based attack and penetration
This repos contains notebooks for the Advanced Solutions Lab: ML Immersion
All the principles of the AI modular structure that generates malicious code fragments sold on the dark web
Industry leading face manipulation platform
An arbitrary face-swapping framework on images and videos with one single trained model!
Extended faceswap extension for StableDiffusion web-ui with multiple faceswaps, inpainting, checkpoints, ....