Lists (22)
Sort Name ascending (A-Z)
AI
Blockchain
certifications
Cloud
Cryptography
CTF-machines
CVE-list
Docker/K8s
Fuzzing
Go
macOSsec
malware samples
master-thesis
matma
mobile
OSWE
Pentest
pentest-tools
programming
Python
Rust
school
Starred repositories
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
All Algorithms implemented in Python
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A curated list of awesome Machine Learning frameworks, libraries and software.
Automatic SQL injection and database takeover tool
A minimal PyTorch re-implementation of the OpenAI GPT (Generative Pretrained Transformer) training
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
The Ethereum Improvement Proposal repository
an awesome list of honeypot resources
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
⭐Github Ranking⭐ Github stars and forks ranking list. Github Top100 stars list of different languages. Automatically update daily. | Github仓库排名,每日自动更新
A True Instrumentable Binary Emulation Framework
Top disclosed reports from HackerOne
Python framework for creating, editing, and invoking Noisy Intermediate-Scale Quantum (NISQ) circuits.
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
Feature rich application Launcher for Linux
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Collections of tools and methods created to aid in OSINT collection
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.