Stars
HaGeZi DNS: Free, Non-Commercial EU Public DNS Servers
.NET Community Toolkit is a collection of helpers and APIs that work for all .NET developers and are agnostic of any specific UI platform. The toolkit is maintained and published by Microsoft, and …
The .NET MAUI Community Toolkit is a community-created library that contains .NET MAUI Extensions, Advanced UI/UX Controls, and Behaviors to help make your life as a .NET MAUI developer easier
A full day workshop (.NET MAUI Workshop in a Box) on how to build apps with .NET MAUI for iOS, Android, macOS, and Windows
A curated list of awesome Android Reverse Engineering training, resources, and tools.
A sorted and updated list of security wargame sites.
Discord bot for organizing channels for CTF-challenges
A list of open source reverse engineering tools with a focus on binary analysis
Six Degrees of Domain Admin
Tutorials for getting started with Pwntools
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
A presentation on the Python module PwnTools.
Python toolset to detect and demonstrate SIGTRAN vulnerabilities. Pwn as in pwntools.
CTF framework and exploit development library
Microsoft PowerToys is a collection of utilities that supercharge productivity and customization on Windows
🙃 A delightful community-driven (with 2,500+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python…
Dynamic DNS (DDNS) service based on Cloudflare! Access your home network remotely via a custom domain name without a static IP! Written in pure BASH~
🎙 A collection of awesome engineering podcasts! ARCHIVED in favor of https://github.com/rShetty/awesome-podcasts
Uploading Images or other documents is a very basic and common requirement when it comes to building anything from a simple application to an enterprise-level solution. Let’s build a small applicat…