Lists (32)
Sort Name ascending (A-Z)
Active Directory Security
Repos regarding Active Directory security/offensive tools for red teaming AD.AI/ML 🤖
Blue Team 📘
Bug Bounty 🐛
C2 Tools/Infrastructure 📡
Repos for C2 infrastructure and C2 tools.CLI 🖥️
CLI tools and reposCloud Security/Pentesting ☁️
CobaltStrike
CobaltStrike ReposDocker Security 🐳
Domain Security
Tools regarding the security of domains, domain spoofing, subdomain takeover, etc.Google Cloud Security
Homelab/FOSS 🏠
Projects relating to homelab, infrastructure, or FOSS alternativesKerberos 🐶
Repos related to Kerberos attack/defense/managementLinux 🐧
Ludus 🏟
Ludus related reposMalDev 👾
Malware development related stuffMarkdown Ⓜ️
Repos regarding Markdown and markdown tools.NTLM Relaying & Forced Auth
Tools for NTLM relaying and forcing authOffsenive C#/.NET
Repos for offensive tooling in C# or .NETOSINT 🕵️
A collection of repos for OSINT!Password Attacks 🗝️
Repos related to password attacks, such as password spraying.Persistence 💾
Repos relating to establishing/maintaining persistence on compromised hosts.Phishing 🎣
Repos to aid in phishing.PowerShell
Repos relating to PowerShell (Modules, Tools, Scripts, etc.)Proxy & Port Forwarding
Repos and tools for proxying and port forwarding!Red Team 🚩
Rust 🦀
Repos related to RustSecurity Research 🔬
Subdomain Enumeration & Hacking
Web App 🕸️
Web App related repositoriesWordlists 📖
Collection of wordlists for password cracking, fuzzing, content discovery, username enumeration, etc.ZSH
Repos related to ZSH (Themes, plugins, etc.)- All languages
- ASP.NET
- ActionScript
- Arduino
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CMake
- CSS
- Dart
- Dockerfile
- Elixir
- Go
- Groff
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- Lua
- Makefile
- Nim
- Nix
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- R
- Roff
- RouterOS Script
- Ruby
- Rust
- SCSS
- Shell
- Standard ML
- Svelte
- Swift
- TypeScript
- VBA
- Vala
- Vim Script
- Vue
- YARA
- Zig
Starred repositories
OBLITERATE THE CHAINS THAT BIND YOU
Open-source AI coworker, with memory
The first open-source harness builder for AI coding. Make AI coding deterministic and repeatable.
The AI Security Verification Standard (AISVS) focuses on providing developers, architects, and security professionals with a structured checklist to verify the security of AI-driven applications.
This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots.
Universal preflight security scanner for AI coding agents — Detects hooks injection, credential exfiltration & backdoors in .cursorrules, CLAUDE.md, AGENTS.md and more.
Ghostty-based macOS terminal with vertical tabs and notifications for AI coding agents
Find zero-days while you sleep. DeepZero is an automated vulnerability research framework that parses, decompiles, and analyzes thousands of Windows kernel drivers for exploitable IOCTLs natively u…
"AutoAgent: Fully-Automated and Zero-Code LLM Agent Framework"
[NeurIPS2025] "AI-Researcher: Autonomous Scientific Innovation" -- A production-ready version: https://novix.science/chat
"🐈 nanobot: The Ultra-Lightweight Personal AI Agent"
"DeepTutor: Agent-Native Personalized Learning Assistant"
RVM — The Virtual Machine Built for the Agentic Age, in Rust.
Curated resources for discovering, reading, and working with arXiv papers
An AI-driven daily arXiv paper crawler, analyzer, and organizer tool, focusing on AIGC
Repository hosting the bluehammer vulnerability
[ICLR 2025] Official PyTorch Implementation of Gated Delta Networks: Improving Mamba2 with Delta Rule
Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)
Fileless C2 agent written in pure x64 Assembly for Linux. Features stealth ICMP tunneling, memory-only execution via memfd_create, and terminal-independent daemonization.
A library for efficient similarity search and clustering of dense vectors.
Leveraging CVEs as North Stars in vulnerability discovery and comprehension.
A method of bypassing EDR's active projection DLL's by preventing entry point exection
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Hunts out CobaltStrike beacons and logs operator command output
Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the OS.
kill anti-malware protected processes ( BYOVD )