Highlights
Lists (4)
Sort Name ascending (A-Z)
Starred repositories
A curated list of free courses with certifications. Also available at https://free-certifications.com/
A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
A cohesive shadcn/ui ecosystem for Flutter
Modern & private time tracking for macOS & Windows. No cloud, no registration, no paywall. Just download and track your work hours 100% offline.
SQL Native Memory Layer for LLMs, AI Agents & Multi-Agent Systems
Autonomous coding agent right in your IDE, capable of creating/editing files, executing commands, using the browser, and more with your permission every step of the way.
Event Driven Orchestration & Scheduling Platform for Mission Critical Applications
Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
GEE! ME is a great set of flat graphics required, 100 cartoon characters and over 400 coolest objects. You can use it in any design or development projects. It’s completely free and just enjoy it~
Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android
Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
macOS Adobe apps download & installer
moseoridev / WarpShare
Forked from vinint/MoKee-WarpShareAn Open-source AirDrop Alternative
Appwrite® - complete cloud infrastructure for your web, mobile and AI apps. Including Auth, Databases, Storage, Functions, Messaging, Hosting, Realtime and more
A new age EMR application using conversational AI at its best.
Monumento: Share, connect, and explore landmarks with AR
A Flutter MVC with RiverPod Application Starter Kit
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.