Stars
- All languages
- Assembly
- Astro
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CSS
- Clojure
- Dart
- Dockerfile
- Elixir
- FreeMarker
- Go
- HCL
- HTML
- Handlebars
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- Lua
- MDX
- Nim
- OCaml
- PHP
- Perl
- PowerShell
- Python
- Raku
- Ruby
- Rust
- SCSS
- Scala
- Shell
- SourcePawn
- Svelte
- TSQL
- TypeScript
- V
- VBA
- Vala
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zig
Open Source Identity and Access Management For Modern Applications and Services
🔎 Open source distributed and RESTful search engine.
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Open-Source Subscription Billing & Payments Platform
Decompiler from Java bytecode to Java, used in IntelliJ IDEA.
Quickly find differences and similarities in disassembled code
MARY TTS -- an open-source, multilingual text-to-speech synthesis system written in pure java
Open Adversarial Exposure Validation Platform
Enterprise-Grade Open-Source Network Management Platform
A malicious LDAP server for JNDI injection attacks
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps v…
TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a software library for more advanced tools.
Pen Test Report Generation and Assessment Collaboration
Automated Android custom unpacker generator
Mallet is an intercepting proxy for arbitrary protocols
Mindolph is an open source personal knowledge management software with Gen-AI support for all desktop platforms.
This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Automation's Ignition software.
A tool collection of various attacks on TLS based on TLS-Attacker