Lists (32)
Sort Name ascending (A-Z)
active directory
API testing
Enumeration and finding swaggerAPK mobile
Audio with AI
Azure
Bug bounty
Cloud
Compile
CVE -Exploits
Darkweb/ Tor
Email spraying bruteforce
GPT / AI
iMessage
LEA-Phish
Local file transfers
M365 cloud
Malware analysis
Obfuscation tools
OSINT
Other
Password manager access
pentest
pentest stuffPentest report writing
Phishing
printers
Red team
Remote access
Roadmaps
Subdomains recon
web app testing
Wifi attacks
XSS
- All languages
- Adblock Filter List
- Arduino
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Dart
- Dockerfile
- Eagle
- Erlang
- Fluent
- GDScript
- GLSL
- Go
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kaitai Struct
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Nim
- Nix
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Puppet
- Python
- QML
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Standard ML
- Svelte
- Swift
- TeX
- TypeScript
- VBA
- VBScript
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zig
Starred repositories
❤️ Generate mermaid diagram and chart with AI MCP dynamically.
GreenPlasma Windows CTFMON Arbitrary Section Creation Elevation of Privileges Vulnerability
YellowKey Bitlocker Bypass Vulnerability
Deepsec is a security harness for finding vulnerabilities in your codebase powered by coding agents
Dynamic, resilient AI orchestration. Coordinate data, models, and compute as you build AI workflows.
PoC for exploiting CVE-2026-26128.
🌊 The leading agent orchestration platform for Claude. Deploy intelligent multi-agent swarms, coordinate autonomous workflows, and build conversational AI systems. Features enterprise-grade archite…
This repo contains the results of an internal re-write of impacket I undertook at my current company. It contains some of the IoCs found within the library
GeoIntel using Google's Gemini API to uncover the location where photos were taken through AI-powered geo-location analysis.
A powerful MCP toolkit for coding, providing semantic retrieval and editing capabilities - the IDE for your agent
Browser Harness | Self-healing harness that enables LLMs to complete any task.
A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.
Repository hosting the bluehammer vulnerability
Tailscale-based Windows VNC persistence tool with Session 0 isolation bypass, embedding a full WireGuard peer and RFB server into a single drop-in binary.
The first open-source harness builder for AI coding. Make AI coding deterministic and repeatable.
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…
An open-source AI assisted firmware analysis tool
Mockoon is the easiest and quickest way to run mock APIs locally. No remote deployment, no account required, open source.
A light-weight and powerful meta-prompting, context engineering and spec-driven development system for Claude Code by TÂCHES.
The agent harness performance optimization system. Skills, instincts, memory, security, and research-first development for Claude Code, Codex, Opencode, Cursor and beyond.
The repo is finally unlocked. enjoy the party! The fastest repo in history to surpass 100K stars ⭐. Join Discord: https://discord.gg/5TUQKqFWd Built in Rust using oh-my-codex.
Create stunning demos for free. Open-source, no subscriptions, no watermarks, and free for commercial use. An alternative to Screen Studio.
The open-source app everyone uses to manage agents at work
π RuView turns commodity WiFi signals into real-time spatial intelligence, vital sign monitoring, and presence detection — all without a single pixel of video.
Generate any location from the real world in Minecraft with a high level of detail.
Open Multi-Agent Interactive Classroom — Get an immersive, multi-agent learning experience in just one click
KslDump — Why bring your own knife when Defender already left one in the kitchen?
AI-safe .env files: Schemas for agents, Secrets for humans.