Starred repositories
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
VoxCPM: Tokenizer-Free TTS for Context-Aware Speech Generation and True-to-Life Voice Cloning
💖🧸 Self hosted, you owned Grok Companion, a container of souls of waifu, cyber livings to bring them into our worlds, wishing to achieve Neuro-sama's altitude. Capable of realtime voice chat, Minec…
Portable file server with accelerated resumable uploads, dedup, WebDAV, SFTP, FTP, TFTP, zeroconf, media indexer, thumbnails++ all in one file
Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy services.
Open source vulnerability DB and triage service.
The Swiss Army knife for automated Web Application Testing
BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory attack paths using natural language ins…
Staging repo for development of native port of TypeScript
CrackerCat / Windows-Non-Paged-Pool-Overflow-Exploitation
Forked from vp777/Windows-Non-Paged-Pool-Overflow-ExploitationTechniques on pool overflow exploitation for the most recent (and oldest) Windows versions
Magic to turn Cursor/Windsurf as 90% of Devin
Code at the speed of thought – Zed is a high-performance, multiplayer code editor from the creators of Atom and Tree-sitter.
ACCOMPLIST - Compiled, Optimized and Aggregated Allow/Block-Lists
Janus-Series: Unified Multimodal Understanding and Generation Models
Android application for running Windows applications with Wine and Box86/Box64
A high-throughput and memory-efficient inference and serving engine for LLMs
Suwayomi Extension for Tachiyomi and variants
Docker files for easy stremio server and client. Images pushed to Dockerhub
Performant financial charts built with HTML5 canvas
This repository contain a CheatSheet for OSWP & WiFi Cracking.
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS