Lists (16)
Sort Name ascending (A-Z)
ATLAS Adversarial ML
AI/ML Security: MITRE ATLAS (atlas.mitre.org) + OWASP LLM Top 10 + Google SAIF. Covers prompt injection, model tampering, data poisoning, agent security, privacTA0001 Initial Access
Initial Access (TA0001): Gaining initial foothold in target networks. Includes phishing, exploiting public-facing apps, supply chain compromise, valid accounts. https://attack.mitre.org/tactics/TA0001TA0002 Execution
Execution (TA0002): Running malicious code on target systems. Includes command interpreters, scripting, native APIs, exploitation for client execution. https://attack.mitre.org/tactics/TA0002TA0003 Persistence
Persistence (TA0003): Maintaining access across restarts and credential changes. Includes registry run keys, scheduled tasks, bootkit, implants, account manipulation. https://attack.mitre.org/tactics/TA0003TA0004 Privilege Escalation
Privilege Escalation (TA0004): Gaining higher-level permissions. Includes exploitation, access token manipulation, UAC bypass, AD escalation, sudo/setuid abuse. https://attack.mitre.org/tactics/TA0004TA0005 Defense Evasion
Defense Evasion (TA0005): Avoiding detection. Includes obfuscation, disabling security tools, process injection, masquerading, AMSI/ETW bypass, rootkits. https://attack.mitre.org/tactics/TA0005TA0006 Credential Access
Credential Access (TA0006): Stealing credentials. Includes password dumping, Kerberoasting, credential harvesting, brute force, keylogging, LSASS access. https://attack.mitre.org/tactics/TA0006TA0007 Discovery
Discovery (TA0007): Understanding target environment. Includes network enumeration, AD recon, system info gathering, account discovery, BloodHound. https://attack.mitre.org/tactics/TA0007TA0008 Lateral Movement
Lateral Movement (TA0008): Moving through the network. Includes pass-the-hash, RDP, SMB/WMI exec, SSH tunneling, pivoting, proxychains. https://attack.mitre.org/tactics/TA0008TA0009 Collection
Collection (TA0009): Gathering target data. Includes screen capture, keylogging, email harvesting, clipboard data, memory dumping, secret scanning. https://attack.mitre.org/tactics/TA0009TA0010 Exfiltration
Exfiltration (TA0010): Stealing data from target. Includes covert channels, DNS tunneling, steganography, encrypted transfers, cloud storage abuse. https://attack.mitre.org/tactics/TA0010TA0011 Command and Control (C2)
Command and Control (TA0011): Communicating with compromised systems. Includes C2 frameworks (Cobalt Strike, Sliver), domain fronting, protocol tunneling. https://attack.mitre.org/tactics/TA0011TA0040 Impact
Impact (TA0040): Disrupting availability or integrity. Includes ransomware, data destruction, defacement, resource hijacking, service disruption. https://attack.mitre.org/tactics/TA0040TA0042 Resource Development
Resource Development (TA0042): Building attack infrastructure. Includes payload development, infrastructure setup, capability acquisition, tool compilation. https://attack.mitre.org/tactics/TA0042TA0043 Reconnaissance
Reconnaissance (TA0043): Gathering target information. Includes OSINT, subdomain enumeration, network scanning, social engineering research. https://attack.mitre.org/tactics/TA0043Threat Hunting
Threat Hunting related repositories- All languages
- Assembly
- AutoIt
- Awk
- Batchfile
- Bicep
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Dockerfile
- Elixir
- F#
- Fortran
- GDScript
- Gherkin
- Gnuplot
- Go
- HCL
- HTML
- Hack
- Handlebars
- Inno Setup
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Just
- KiCad Layout
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Nim
- OCaml
- Objective-C
- Odin
- Open Policy Agent
- PHP
- Pascal
- Perl
- PowerShell
- Pug
- Puppet
- Python
- QML
- R
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Self
- Shell
- Smarty
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- VBScript
- Vala
- Verilog
- Vim Script
- Visual Basic
- Visual Basic .NET
- Visual Basic 6.0
- Vue
- XSLT
- YAML
- YARA
- Zig
Starred repositories
Show usage stats for OpenAI Codex and Claude Code, without having to login.
GitNexus: The Zero-Server Code Intelligence Engine - GitNexus is a client-side knowledge graph creator that runs entirely in your browser. Drop in a GitHub repo or ZIP file, and get an interactive β¦
Hundreds of models & providers. One command to find what runs on your hardware.
AirLLM 70B inference with single 4GB GPU
OpenCode port of Flow-Next: plan-first workflows, Ralph autonomous mode (overnight coding with fresh context), multi-model review gates via Codex, re-anchoring to prevent drift, receipt-based gating.
Claude Code plugins for reliable AI coding. Flow-Next: plan-first workflows, Ralph autonomous mode (overnight coding with fresh context), multi-model review gates via RepoPrompt/Codex, re-anchoringβ¦
An AI-powered task-management system you can drop into Cursor, Lovable, Windsurf, Roo, and others.
π Python3 module for deleting Slack messages and files using the Slack REST API
A template for developing Rust projects, with sensible defaults
IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare
Check subdomains for subdomain takeovers and other DNS tomfoolery
A collection of (mostly) technical things every software developer should know about
An open-source database of AI models.
βποΈ The minimal, blazing-fast, and infinitely customizable prompt for any shell!
π A curated list of papers & technical articles on AI Quality & Safety
π’ Open-Source Evaluation & Testing library for LLM Agents
Living off the land searches for explorer and sharepoint
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
A collection of useful resources for hacking WordPress and it's plugins and themes
π Configuration files that enhance Cursor AI editor experience with custom rules and behaviors
π Human-friendly and powerful HTTP request library for Node.js
πͺπ» Blazing-fast system monitoring for your desktop (built with Rust, Tauri & Svelte)
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
PoC Implementation of a fully dynamic call stack spoofer
π§ Abuse of Google Colab for cracking hashes.
IPFuscator - A tool to automatically generate alternative IP representations