-
11:49
(UTC +08:00)
Stars
- All languages
- Arduino
- Assembly
- AutoHotkey
- Awk
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Dockerfile
- Elixir
- Erlang
- Go
- HTML
- Haskell
- Java
- JavaScript
- Kotlin
- Lua
- MDX
- Makefile
- Nim
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- Raku
- Ruby
- Rust
- SCSS
- Shell
- Smali
- Solidity
- TeX
- TypeScript
- VBA
- Vala
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
An opinionated list of awesome Python frameworks, libraries, software and resources.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Ansible is a radically simple IT automation platform that makes your applications and systems easier to deploy and maintain. Automate everything from code deployment to network configuration to clo…
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
We have made you a wrapper you can't refuse
Write scalable load tests in plain Python 🚗💨
get things from one computer to another, safely
Impacket is a collection of Python classes for working with network protocols.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
CTF framework and exploit development library
Exploitation Framework for Embedded Devices
Incredibly fast crawler designed for OSINT.
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.
Scapy: the Python-based interactive packet manipulation program & library.
Proxy server to bypass Cloudflare protection
Fast subdomains enumeration tool for penetration testers
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
An open-source post-exploitation framework for students, researchers and developers.
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
Rewrite of the popular wireless network auditor, "wifite"
🛡️ Windows Hello™ style facial authentication for Linux
Infection Monkey - An open-source adversary emulation platform
Securely and anonymously share files, host websites, and chat with friends using the Tor network