Lists (1)
Sort Name ascending (A-Z)
Stars
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
This repo includes ChatGPT prompt curation to use ChatGPT and other LLM tools better.
🌐 Make websites accessible for AI agents. Automate tasks online with ease.
Drop in a screenshot and convert it to clean code (HTML/Tailwind/React/Vue)
The official gpt4free repository | various collection of powerful language models | o4, o3 and deepseek r1, gpt-4.1, gemini 2.5
[Support 0.49.x](Reset Cursor AI MachineID & Bypass Higher Token Limit) Cursor Ai ,自动重置机器ID , 免费升级使用Pro功能: You've reached your trial request limit. / Too many free trial accounts used on this machi…
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
解决Cursor在免费订阅期间出现以下提示的问题: Your request has been blocked as our system has detected suspicious activity / You've reached your trial request limit. / Too many free trial accounts used on this machine.
AlexeyAB / darknet
Forked from pjreddie/darknetYOLOv4 / Scaled-YOLOv4 / YOLO - Neural Networks for Object Detection (Windows and Linux version of Darknet )
Pre-Built Vulnerable Environments Based on Docker-Compose
gpt-oss-120b and gpt-oss-20b are two open-weight language models by OpenAI
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
Collection of malware source code for a variety of platforms in an array of different programming languages.
Prompt, run, edit, and deploy full-stack web applications. -- bolt.new -- Help Center: https://support.bolt.new/ -- Community Support: https://discord.com/invite/stackblitz
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
"AI-Trader: Can AI Beat the Market?" Live Trading Bench: https://ai4trade.ai
Automagically reverse-engineer REST APIs via capturing traffic
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Tools and Techniques for Red Team / Penetration Testing
Gather and update all available and newest CVEs with their PoC.
Bare metal to production ready in mins; your own fly server on your VPS.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Collection of Cyber Threat Intelligence sources from the deep and dark web