Lists (32)
Sort Name ascending (A-Z)
Awesome Lists
Blue Team
Cloud Security
Dotfiles
Finance Tools
Gaming
GenAI - Audio/Visual
GenAI - LLMs
Homelab
Interesting Shit
Linux Utilities
MacOS Utilities
Mobile
Networking Tools
OSINT
Other Dev stuff
Programming Languages
Red Team - AI
Red Team - Credential Harvesting
Red Team - Evasion
Red Team - Initial Access
Red Team - Persistence
Red Team - Privilege Escalation
Red Team - Recon
Red Team - Social Engineering
Resume Templates
Reverse Engineering
SAST / DAST
Themes
Vulnerable Labs
Web Development
Windows Utilities
- All languages
- Assembly
- Astro
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Clojure
- CodeQL
- Dart
- Dockerfile
- Fluent
- G-code
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Logos
- Lua
- Makefile
- Markdown
- Meson
- Nim
- OCaml
- Objective-C
- Objective-C++
- Open Policy Agent
- PHP
- Pascal
- Perl
- PowerShell
- Python
- RenderScript
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Smarty
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- V
- VBA
- Vim Script
- Vue
- XSLT
- YAML
- YARA
- Zeek
- Zig
Starred repositories
A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
🧠 Laws, Theories, Principles and Patterns for developers and technologists.
Modern JavaScript Tutorial
🐧 A list of awesome Linux softwares
Community guide to using YubiKey for GnuPG and SSH - protect secrets with hardware crypto.
Automagically reverse-engineer REST APIs via capturing traffic
Password protect a static HTML page, decrypted in-browser in JS with no dependency. No server logic needed.
A rendition of everyone's favorite 1995 Microsoft operating system for Linux.
Automate the creation of a lab environment complete with security tooling and logging best practices
Open-Source Unified Vulnerability Management, DevSecOps & ASPM
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Better privacy without special software
Malware samples, analysis exercises and other interesting resources.
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.
This project is now discontinued. Kindly use other working alternatives.
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provi…
IPFuscator - A tool to automatically generate alternative IP representations
⌨️ Wordlists, Dictionaries and Other Data Sets for Writing Software Security Test Cases
MSPortals.io - Microsoft Administrator Sites, Training, and Licensing Resources