Lists (1)
Sort Name ascending (A-Z)
Starred repositories
all of the workflows of n8n i could find (also from the site itself)
Run your own AI cluster at home with everyday devices 📱💻 🖥️⌚
AIHawk aims to easy job hunt process by automating the job application process. Utilizing artificial intelligence, it enables users to apply for multiple jobs in a tailored way.
CTF framework and exploit development library
OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
Proxy server to bypass Cloudflare protection
The recursive internet scanner for hackers. 🧡
Open Source Vulnerability Management Platform
An OSINT tool to search for accounts by username and email in social networks.
Run Windows Applications on Linux as if they are native, Use linux applications to launch files files located in windows vm without needing to install applications on vm. With easy to use configura…
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
An AI-powered file management tool that ensures privacy by organizing local texts, images. Using Llama3.2 3B and Llava v1.6 models with the Nexa SDK, it intuitively scans, restructures, and organiz…
A unified inference and post-training framework for accelerated video generation.
A OSINT tool to obtain a target's phone number just by having his email address
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
🐛 A list of writeups from the Google VRP Bug Bounty program
WebMap-Nmap Web Dashboard and Reporting
A modular vulnerability scanner with automatic report generation capabilities.
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection
A New Approach to Directory Bruteforce with WaybackLister v1.0
A tool for quantitative risk analysis of Android applications based on machine learning techniques
automated Open Source Intelligence gathering
NetworkSherlock: powerful and flexible port scanning tool With Shodan
Machine-readable .txt blocklist of scam URLs and IP Addresses from the Global Anti Scam Organization (https://www.globalantiscam.org) website, updated once a day.
Whether you're a seasoned expert or a beginner, Kali GPT helps streamline your workflow, making penetration testing more efficient and accessible.
An automated repo to track Nuclei template scanning capabilities against the CISA KEV.