Stars
A Claude Code plugin that automatically captures everything Claude does during your coding sessions, compresses it with AI (using Claude's agent-sdk), and injects relevant context back into future …
Agentic AI Infrastructure for magnifying HUMAN capabilities.
Wrap Gemini CLI, Antigravity, ChatGPT Codex, Claude Code, Qwen Code, iFlow as an OpenAI/Gemini/Claude/Codex compatible API service, allowing you to enjoy the free Gemini 2.5 Pro, GPT 5, Claude, Qwe…
Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir
crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names from certificates. Perfect for security researchers and develope…
Certificate Transparency Community Website
Intelligent automation and multi-agent orchestration for Claude Code
NCD scripting language, tun2socks proxifier, P2P VPN
🖥️ P2P Remote Desktop - Portable, No Configuration or Installation Needed.
A next-generation crawling and spidering framework.
Teach a chatbot to be a bookworm with Langchain and OpenAI's GPT-3.5 language model. Get answers to all your burning questions straight from the pages of a PDF!
Two bots written in JS that uses flashswaps and normal swaps to arbitrage Uniswap. Includes an automated demostration.
A workshop about Malware Development
CodeQL: the libraries and queries that power security researchers around the world, as well as code scanning in GitHub Advanced Security
Easy SimAuto (ESA): An easy-to-use Power System Analysis Automation Environment atop PowerWorld Simulator Automation Server (SimAuto)
Enables TCP/IP client/server connection between Matlab and 4diac Communication Service Interface Function blocks (SERVER/CLIENT)
Rapid-prototyping protection and control schemes with IEC 61850
A Node.js implementation of the PKCS#11 2.40 interface
Monitor linux processes without root permissions
My musings with PowerShell
PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
Extract the information needed from the Manifest.plist files to convert it to hashes compatible with hashcat
Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test out Microsoft's security products.
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.