Lists (32)
Sort Name ascending (A-Z)
AI Agents
AI Agents / appsAutomation
data-vacuum
debugging
forensics
garden/hydro
hacking
ICS/OT
ICS protocol libraries
Incident Response
java
linux-tools
logging
malware
mapping/gis
MY-PROJECTS
NW
object-detection
OSCP
phishing
Powershell
python
red-team-tools
robotics
Rust
SCADA
sec-ai
sec_reports
secure-comms
self-host ideas
self-host ideastraffic monitors/packet capture
Win-Server-exploits
- All languages
- Astro
- Batchfile
- Bicep
- C
- C#
- C++
- CSS
- Clojure
- Common Lisp
- Cython
- Dockerfile
- GAP
- Go
- HTML
- Hack
- Handlebars
- Haskell
- Java
- JavaScript
- Julia
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- MDX
- Makefile
- Markdown
- Nunjucks
- Objective-C
- PHP
- Perl
- PowerShell
- Pug
- Python
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Scheme
- Shell
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- TypeSpec
- VHDL
- Visual Basic
- Vue
- XSLT
- YARA
- Zeek
Starred repositories
🎓 Path to a free self-taught education in Computer Science!
🧠 Laws, Theories, Principles and Patterns for developers and technologists.
A curated list of awesome warez and piracy links
Web Starter Kit - a workflow for multi-device websites
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Free Bootstrap Admin & Dashboard Template
A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.
A booklet on machine learning systems design with exercises. NOT the repo for the book "Designing Machine Learning Systems", which is `dmls-book`
Mini website for testing both general CS knowledge and enforce coding practice and common algorithm/data structure memorization.
Solid - Re-decentralizing the web (project directory)
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Automate the creation of a lab environment complete with security tooling and logging best practices
BOM, STL files and instructions for PAROL6 3D printed robot arm
The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Tools, tips, tricks, and more for exploring ICS Security.
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
Malware samples, analysis exercises and other interesting resources.
CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.
Tracking interesting Linux (and UNIX) malware. Send PRs
Hackathon starter project for Flask applications
Hackathon starter project for Node.js applications
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
A python module for working with ATT&CK
Vocabulary for Event Recording and Incident Sharing (VERIS)
syllabus for the Advanced JavaScript class at NYU
webShark: Wireshark & PCAPs in your browser, 100% Open-Source Cloudshark alternative based on sharkd
Official TODO Website that contains TODO Guides, OSPO use cases and more resources to advance in the OSPO journey
Tools for converting Garageband files to MIDI files
Presentation at Perth Data Science Meetup, February 2015