Starred repositories
FastAPI framework, high performance, easy to learn, fast to code, ready for production
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Deep Learning papers reading roadmap for anyone who are eager to learn this amazing tech!
PyTorch Tutorial for Deep Learning Researchers
Ready-to-use OCR with 80+ supported languages and all popular writing scripts including Latin, Chinese, Arabic, Devanagari, Cyrillic and etc.
A set of examples around pytorch in Vision, Text, Reinforcement Learning, etc.
E-mails, subdomains and names Harvester - OSINT
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
Fast subdomains enumeration tool for penetration testers
Practical Python Programming (course by @dabeaz)
Tensorflow2.0 🍎🍊 is delicious, just eat it! 😋😋
An open-source post-exploitation framework for students, researchers and developers.
A swiss army knife for pentesting networks
Library for building WebSocket servers and clients in Python
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
Handwriting Synthesis with RNNs ✏️
« usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.
Continuously jam all wifi clients/routers
Makes you a Rockstar C++ Programmer in 2 minutes
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…
Hummingbird compiles trained ML models into tensor computation for faster inference.
A DNS meta-query spider that enumerates DNS records, and subdomains.
DataSploit / datasploit
Forked from dvopsway/datasploitAn #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3