Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.
bladeRF USB 3.0 Superspeed Software Defined Radio Source Code
Onyx Emacs - An emacs android configuration for note taking with org-mode and markdown
Awesome list of free and freeware virtual instruments for Linux
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
kubenav is the navigator for your Kubernetes clusters right in your pocket.
Live coding environment with Overtone and Leipzig
Produces visualizations of network data in Blender.
Digital clone of an analog synthesizer using Overtone and Quil
For those who enjoy splitting windows left and right.
A Clojure wrapper library for the Discord API, with full API coverage (except voice, for now), and high scalability
Quickly create and run optimised Windows, macOS and Linux virtual machines
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Generating accessible music with Clojure and Overtone (and a primer in Music theory).
Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.
convert between PCRE, Emacs and rx regexp syntax
All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!
pull decrypted ipa from jailbreak device
A utility that makes OpenKeychain available in your Termux shell
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
Emacs as your personal AI assistant. Use LLMs such as ChatGPT or LLaMA for text generation or DALL-E and Stable Diffusion for image generation. Also supports speech input / output.