Stars
- All languages
- Assembly
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Common Lisp
- Crystal
- Dart
- Dockerfile
- Emacs Lisp
- Go
- HCL
- HTML
- Hack
- Haskell
- HolyC
- Inno Setup
- Java
- JavaScript
- Julia
- Jupyter Notebook
- Just
- Kotlin
- Lua
- Makefile
- Markdown
- Max
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Scheme
- Shell
- Smarty
- Swift
- TeX
- TypeScript
- V
- VBA
- VCL
- Vim Script
- Visual Basic 6.0
- Vue
- WebAssembly
- XSLT
- YARA
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Hunt down social media accounts by username across social networks
The official gpt4free repository | various collection of powerful language models | o4, o3 and deepseek r1, gpt-4.1, gemini 2.5
A natural language interface for computers
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Framework for orchestrating role-playing, autonomous AI agents. By fostering collaborative intelligence, CrewAI empowers agents to work together seamlessly, tackling complex tasks.
Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
OCRmyPDF adds an OCR text layer to scanned PDF files, allowing them to be searched
Convert PDF to markdown + JSON quickly with high accuracy
Full reference of LinkedIn answers 2024 for skill assessments (aws-lambda, rest-api, javascript, react, git, html, jquery, mongodb, java, Go, python, machine-learning, power-point) linkedin excel t…
🕵️♂️ Collect a dossier on a person by username from thousands of sites
An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Impacket is a collection of Python classes for working with network protocols.
CTF framework and exploit development library
Exploitation Framework for Embedded Devices
Deduplicating archiver with compression and authenticated encryption.
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
an awesome list of honeypot resources
Self-hosted bookmark manager that is designed be to be minimal, fast, and easy to set up using Docker.
An open-source post-exploitation framework for students, researchers and developers.
📱 objection - runtime mobile exploration