Lists (19)
Sort Name ascending (A-Z)
3dp
p3daudio
fill the gap with tap tap tapbertuna
flp
How2S/TUTORIALS
...once to be consumed, nowhpc
it-mgmt
oss mgmt systems/apps. UI is mandatory, due 'I hate cmdline' illness affecting many others :/machines
Music and Machines Tools/Utilsmate
net_automata
netbox, napalm, netmiko, para-miko, nornir, i'm sensible, self doc., auto doc., stimpack, JET, olym-pics, para-olym-pics, puppet and its masternetworking
Network infrastructure collectionnix-tools
no_strch_bks
...once to be consumed, now!pgsql
pxmx_pve_pbs
px mxsdr
sec
w_tools
zbp
carculcah/kraken/matilda/picker/womacka relatedStarred repositories
DNS-Blocklists: For a better internet - keep the internet clean!
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
An open-source, self-hosted note-taking service. Your thoughts, your data, your control — no tracking, no ads, no subscription fees.
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
Multi-protocol control & translation software (ArtNet, MIDI, OSC, sACN, ...)
A tool to list the SSH clone URLs for all GitHub repos for a given user
Find domains and subdomains related to a given domain
A GUI to quickly manage your WSL2 instances
swisskyrepo / jsleak
Forked from byt3hx/jsleakUpgrading jsleak with a CI/CD and new rules
Automatic SSRF fuzzer and exploitation tool
GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)
Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud
Simple script for the WHID injector - a rubberducky wifi
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Netbox Plugin for integration between Proxmox and Netbox
GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.