Lists (10)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- C
- C#
- C++
- CMake
- CSS
- Clojure
- Common Lisp
- Crystal
- Dart
- Dockerfile
- Elixir
- Fennel
- GDScript
- Go
- HCL
- HTML
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Nim
- Nix
- Nushell
- Objective-C
- PHP
- Pascal
- PowerShell
- Python
- QML
- Reason
- Ruby
- Rust
- SCSS
- Shell
- Svelte
- Swift
- SystemVerilog
- TeX
- TypeScript
- Vala
- Vim Script
- Vue
- XSLT
- YAML
- YARA
- Zig
Summon AI at your command line with a convenient keystroke
Personal AI Infrastructure for upgrading humans.
Create stunning screen recordings for free. Open-source, no subscriptions, no watermarks, and free for commercial use. An alternative to Screen Studio.
A Dockerized build pipeline for custom Windows x64 shellcode
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…
AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with intelligent fuzzing, AI-driven analysis, and a marketplace of s…
delegated, decentralized, capabilities based authorization token
Modern Java decompiler aiming to be as accurate as possible, with an emphasis on output quality. Fork of the Fernflower decompiler.
SLM assistant for automatic Python documentation
DSPy: The framework for programming—not prompting—language models
Personal Access Token (PAT) recon tool for bug bounty hunters, pentesters & red teams
Throw a tag at it and it comes back with a checksum.
Creates CycloneDX Bill of Materials (BOM) for your projects from source and container images. Supports many languages and package managers. Integrate in your CI/CD pipeline with automatic submissio…
atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.
Runtime Security Solution for your CI/CD Pipeline
Protection against Model Serialization Attacks
Focused malicious code detection ruleset, with a high protection-to-noise ratio
Protect against malicious code installed via npm, yarn, pnpm, npx, and pnpx with Aikido Safe Chain. Free to use, no tokens required.
LLM Council works together to answer your hardest questions
A Beautiful Private and Secure Desktop Investment Tracking Application
AirPods liberated from Apple's ecosystem.
Simple configuration management for Omarchy using GNU stow.
A modern static site generator by the Material for MkDocs team
The main repository for the Linux and Mac OS Bedrock edition Minecraft launcher.