Lists (6)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP
- Arduino
- Assembly
- Astro
- Batchfile
- BitBake
- BlitzBasic
- Brainfuck
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Dockerfile
- F#
- Game Maker Language
- Go
- Groff
- HCL
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Markdown
- Nim
- Objective-C
- OpenSCAD
- PHP
- Pascal
- Perl
- PowerShell
- Python
- R
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Scilab
- Shell
- Smarty
- Standard ML
- Svelte
- Swift
- TeX
- TypeScript
- VBA
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zeek
Algorithms and Data Structures implemented in JavaScript for beginners, following best practices.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Community curated list of templates for the nuclei engine to find security vulnerabilities.
A curated list of CTF frameworks, libraries, resources and softwares
HackerNews clone built with Vue 2.0, vue-router & vuex, with server-side rendering
A collaborative, multi-platform, red teaming framework
Cloud Security Posture Management (CSPM)
💫 Display dynamic, automatically organised, customizable network views.
List of sites with two factor auth support which includes SMS, email, phone calls, hardware, and software.
Web-based XMPP/Jabber chat written in JavaScript
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
📅 Create a fully customizable, interactive timelines and 2d-graphs with items and ranges.
An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!
finds publicly known security vulnerabilities in a website's frontend JavaScript libraries
The "nearly invisible" way to server-render React applications
A low-level browser automation framework built on top of the Web Extensions API standard.
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
Small footprint URL parser that works seamlessly across Node.js and browser environments.
A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSockets and external resource fingerprinting.
Nameserver DNS poisoning attacks made easy
Investigate suspicious activity by visualizing Sysmon's event log
📊 Create interactive, animated 3d graphs. Surfaces, lines, dots and block styling out of the box.
Self-contained packer for size-constrained JS code
🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.