Lists (3)
Sort Name ascending (A-Z)
Starred repositories
A visual methodology tracking platform tailored for offensive security assessments
A minimal, accessible and SEO-friendly Astro blog theme
A modern webapp to write, run and learn M68K, MIPS, RISC-V, X86 assembly
π₯· SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, ethical hacking, and penetration testing.
π Some useful websites for programmers.
Papers from the computer science community to read and discuss.
Curated list of project-based tutorials
FULL Augment Code, Claude Code, Cluely, CodeBuddy, Comet, Cursor, Devin AI, Junie, Kiro, Leap.new, Lovable, Manus, NotionAI, Orchids.app, Perplexity, Poke, Qoder, Replit, Same.dev, Trae, Traycer AIβ¦
Automation to assess the state of your M365 tenant against CISA's baselines
100+ AI Agent & RAG apps you can actually run β clone, customize, ship.
This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stageβ¦
Purple Team Exercise Framework
Windows OS Hardening with PowerShell DSC
Rsources that are publicly available, these resources are linked to the SANS SEC598 Class
a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.
Bazel Starlark extensions for defining fuzz tests in Bazel projects
Ultimate Python study guide π π π
π Playground and cheatsheet for learning Python. Collection of Python scripts that are split by topics and contain code examples with explanations.
All Algorithms implemented in Python
A list of Free Software network services and web applications which can be hosted on your own servers
If you want to become good at system design, join this newsletter now π
A curated list of GPT agents for cybersecurity
A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that may be discovered during a penetration test.
ripgrep recursively searches directories for a regex pattern while respecting your gitignore
A script that you can run in the background!