Lists (1)
Sort Name ascending (A-Z)
Stars
💫 Toolkit to help you get started with Spec-Driven Development
A lightweight spec-driven development layer for solo devs and indie makers. Built on top of GitHub’s SpecKit, Hey Spex keeps your specs, context, and guardrails in sync so AI builds what you mean, …
RAGFlow is a leading open-source Retrieval-Augmented Generation (RAG) engine that fuses cutting-edge RAG with Agent capabilities to create a superior context layer for LLMs
A framework for agentic workflow creation and deployment
Retentioneering: product analytics, data-driven customer journey map optimization, marketing analytics, web analytics, transaction analytics, graph visualization, and behavioral segmentation with c…
Generic rag framework to apply the power of LLMs on any given dataset
✅ Curated list of resources for college students
A Collection Of All Free Student Offers & Discount while you are a student.
FULL Augment Code, Claude Code, Cluely, CodeBuddy, Comet, Cursor, Devin AI, Junie, Kiro, Leap.new, Lovable, Manus Agent Tools, NotionAI, Orchids.app, Perplexity, Poke, Qoder, Replit, Same.dev, Trae…
Free, local, open-source AI app builder ✨ v0 / lovable / Bolt alternative 🌟 Star if you like it!
🔥 Clone and recreate any website as a modern React app in seconds
all of the workflows of n8n i could find (also from the site itself)
Supercharge your workflow automation with this curated collection of n8n templates! Instantly connect your favorite apps-like Gmail, Telegram, Google Drive, Slack, and more-with ready-to-use, AI-po…
Termux üçün Hacking Tool / Hacking Tool for Termux
midtur / informer
Forked from paulpierre/informerA Telegram Mass Surveillance Bot in Python
itsallpretend / SecLists
Forked from jhaddix/SecListsSecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strin…
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.
Obtain an email full profile including reputation, consistency, deliverability, social networks account linked, plus more data points.
early cascade injection PoC based on Outflanks blog post, in rust
Resources for Windows exploit development
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
L3MON is a web-based Remote Administration Tool ( android-RAT ) for managing Android devices via a secure Node.js dashboard. Supports real-time monitoring, data extraction, and remote control for e…