Lists (4)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Cuda
- F#
- Go
- Groovy
- HCL
- HTML
- Hack
- Handlebars
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- Makefile
- Markdown
- Max
- Nim
- OCaml
- OpenSCAD
- PHP
- Perl
- PowerShell
- Processing
- Python
- R
- Ruby
- Rust
- SMT
- Scala
- Shell
- Swift
- SystemVerilog
- TeX
- TypeScript
- VBA
- Visual Basic
- Vue
- YAML
- YARA
🙃 A delightful community-driven (with 2,400+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python…
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Prevents you from committing secrets and credentials into git repositories
A few starter examples of ansible playbooks, to show features and how they work together. See http://galaxy.ansible.com for example roles from the Ansible community for deploying many popular appli…
OSS-Fuzz - continuous fuzzing for open source software.
A delightful community-driven framework for managing your bash configuration, and an auto-update tool so that makes it easy to keep up with the latest updates from the community.
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections…
Git All the Payloads! A collection of web attack payloads.
Collection of steganography tools - helps with CTF challenges
A collection of LS_COLORS definitions; needs your contribution!
Command-line utility for limiting an adapter's bandwidth
Educational, CTF-styled labs for individuals interested in Memory Forensics
A Suricata based NDR distribution
Vagrant projects for Oracle products and other examples
A collection of sources of indicators of compromise.
Install and Configure Common Car Hacking Tools.
A collection of reusable Bash functions for handling common tasks such as logging, assertions, string manipulation, and more
Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux
You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all passwords from known locations.
Security Technical Implementation Guide for Debian
Toolkit for implant attack of IoT devices
System for network traffic analysis and anomaly detection.
This is the outline and content of an introduction to Linux Technology and Philosophy
Open source entropy based invalid traffic detection and pre-bid filtering.
Files used for reproducing Fuzzware's experiments
Scripts and tools that make up the Netkit core
Single source of documentation for the University of Alberta Libraries developers common tools and practices
This is the outline and of intermediate content for Linux Technology and Philosophy based on LPIC II