Lists (1)
Sort Name ascending (A-Z)
Starred repositories
The script will scan for SUID binaries on the system and check them against GTFOBins for potential vulnerabilities and privilege escalation techniques.
RP2040 & RP2350 USB gamepad emulation for multiple platforms.
A collection of awesome lists for hackers, pentesters & security researchers.
A scalable overlay networking tool with a focus on performance, simplicity and security
Transform your project into an explorable 3D world
Portable file server with accelerated resumable uploads, dedup, WebDAV, FTP, TFTP, zeroconf, media indexer, thumbnails++ all in one file, no deps
collection of books 48 laws of power, meditations, Atomic habits and many more
Digital logic design tool and simulator
Study on my own about Algorithm Specialization on Coursera provided by Stanford.
💡algorithmsilluminated.org by Tim Roughgarden
An unofficial rules engine for the world's greatest card game.
A modern re-implementation of the classic DOS game Duke Nukem II
Quake Essentials. Better than what a licencee of id would get in 1996. For even more goodness to base your game off of, see https://github.com/VeraVisions/nuclide
A lightweight, secure, and feature-rich Discord terminal (TUI) client.
Zines, Newsletters and Stuff that may be older than you!
Python Linters and Code Analysis tools curated list
Dire Wolf is a software "soundcard" AX.25 packet modem/TNC and APRS encoder/decoder. It can be used stand-alone to observe APRS traffic, as a tracker, digipeater, APRStt gateway, or Internet Gatewa…
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
This is a decompression bomb (also known as zip of death or zip bomb) designed to crash or render useless the program or system reading it.
The Ultimate Kali Linux Book Audiobook by Packt