Starred repositories
π Freely available programming books
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Your AI second brain. Self-hostable. Get answers from the web or your docs. Build custom agents, schedule automations, do deep research. Turn any online or local LLM into your personal, autonomous β¦
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Intelligent automation and multi-agent orchestration for Claude Code
Ansible for DevOps examples.
Fully automated homelab from empty disk to running services with a single command.
Light, flexible and extensible ASGI framework | Built to scale
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈ