Stars
π Awesome lists about all kinds of interesting topics
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.
A feature-rich command-line audio/video downloader
Bring data to life with SVG, Canvas and HTML. πππ
A collection of various awesome lists for hackers, pentesters and security researchers
Magnificent app which corrects your previous console command.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, seβ¦
Google Chrome, Firefox, and Thunderbird extension that lets you write email in Markdown and render it before sending.
ripgrep recursively searches directories for a regex pattern while respecting your gitignore
π A list of practical projects that anyone can solve in any programming language.
A collection of samples to discuss and showcase different architectural tools and patterns for Android apps.
Easily and securely send things from one computer to another π π¦
Send push notifications to your phone or desktop using PUT/POST
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
World's fastest and most advanced password recovery utility
A curated list of amazingly awesome open source sysadmin resources inspired by Awesome PHP.
Find, verify, and analyze leaked credentials
SQL powered operating system instrumentation, monitoring, and analytics.
A little tool to play with Windows security
Impacket is a collection of Python classes for working with network protocols.
Software to automate the management and configuration of infrastructure and applications at scale.
EF Core is a modern object-database mapper for .NET. It supports LINQ queries, change tracking, updates, and schema migrations.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication