Stars
- All languages
- ActionScript
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Classic ASP
- CodeQL
- CoffeeScript
- Dockerfile
- Go
- HCL
- HTML
- Hack
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Just
- Kotlin
- Lua
- Makefile
- Markdown
- Nim
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Raku
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Smali
- Smarty
- SourcePawn
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- VBScript
- Vue
- XSLT
⚡机器学习实战(Python3):kNN、决策树、贝叶斯、逻辑回归、SVM、线性回归、树回归
An open-source post-exploitation framework for students, researchers and developers.
Pocket Flow: 100-line LLM framework. Let Agents build Agents!
A swiss army knife for pentesting networks
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Diff Match Patch is a high-performance library in multiple languages that manipulates plain text.
An advanced memory forensics framework
越来越多的网站具有反爬虫特性,有的用图片隐藏关键数据,有的使用反人类的验证码,建立反反爬虫的代码仓库,通过与不同特性的网站做斗争(无恶意)提高技术。(欢迎提交难以采集的网站)(因工作原因,项目暂停)
Python library and shell utilities to monitor filesystem events.
A Python library for the Docker Engine API
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
The FLARE team's open-source tool to identify capabilities in executable files.
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Hunt for security weaknesses in Kubernetes clusters
Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.