Stars
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
The new Windows Terminal and the original Windows console host, all in the same place!
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Interact with your documents using the power of GPT, 100% privately, no data leaks
A collection of modern/faster/saner alternatives to common unix commands.
Novel Coronavirus (COVID-19) Cases, provided by JHU CSSE
The most advanced free and open-source browser fingerprinting library
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security,…
Find, verify, and analyze leaked credentials
get things from one computer to another, safely
OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Collection of malware source code for a variety of platforms in an array of different programming languages.
Set up your own OpenVPN server on Debian, Ubuntu, Fedora, CentOS, Arch Linux and more
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
cheat allows you to create and view interactive cheatsheets on the command-line. It was designed to help remind *nix system administrators of options for commands that they use frequently, but not …
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Exploitation Framework for Embedded Devices
PowerSploit - A PowerShell Post-Exploitation Framework
FreeRDP is a free remote desktop protocol library and clients
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss