Lists (6)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP
- Assembly
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Clojure
- DIGITAL Command Language
- Dockerfile
- F#
- FreeMarker
- Go
- HCL
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- LLVM
- Logos
- Makefile
- Nim
- PHP
- Pascal
- PowerShell
- Python
- R
- Ruby
- Rust
- SCSS
- Shell
- Svelte
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- Verilog
- Visual Basic
- Vue
- XSLT
- YARA
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Resources for Application Security including Web, API, Android, iOS and Thick Client
YANG-based toolchain including NETCONF and RESTCONF interfaces and an interactive CLI
An open-source web app that let's you encrypt or decrypt any message you want using various algorithms and keys.
Foodies a restaurant locator and digital menu
SecureLink is a link shortener that gives you full control over your links. You can set a password, a read count limit and a one-time open option for your links.
Reconmap's web client written in React. Manage all your pentest projects from a single place.
Scripts I use during pentest engagements.
✦ My personal website built using Next.js, Tailwind CSS, shadcn/ui, Contentful, Raindrop, Supabase and deployed on Vercel.
Here is a curation of awesome tools built by Nigerians that can be used by anybody and from anywhere in the world.
An opinionated collection of components, hooks, and utilities for your Next.js project.
apakah benar, ikan berkepala lele itu asli?
🚪 This a landing page website made for interior home designers. Made with Next.js | Chakra UI.
Creating infrastructure and running applications using different platforms
Docker image with Meinheld and Gunicorn for Flask applications in Python.
APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploitable issues and common attack paths.
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
DKMC - Dont kill my cat - Malicious payload evasion tool
a low(zero) cost threat intelligence&response tool against phishing domains
🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.
AmsiScanBufferBypass using D/Invoke
My notes while studying Windows exploitation
Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A collection of awesome lists for hackers, pentesters & security researchers.