Lists (18)
Sort Name ascending (A-Z)
AI Ml LLM
AWS Security
List containing anything and everything that may help in securing AWSBDR
Containers
Crypto
Detection Engineering
Forensics
GRC
Incident Response
Interesting Projects
Interview
Kubernetes
Linux
List to store repos that has interesting project pertaining to ebpf or linux kernel securityLinux Music
Red Team
Sandbox
Virtualization
Zero Trust
- All languages
- Assembly
- Awk
- C
- C#
- C++
- CSS
- Clojure
- CodeQL
- DIGITAL Command Language
- Dart
- Dockerfile
- Elixir
- Go
- Go Template
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Just
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Nix
- OCaml
- Objective-C++
- Open Policy Agent
- PHP
- Perl
- PowerShell
- Puppet
- PureScript
- Python
- R
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Starlark
- Svelte
- Swift
- TypeScript
- Vue
- YARA
Starred repositories
CLI tool to setup a testing TOR network with Docker
Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.
Fast and lightweight DNS proxy as ad-blocker for local network with many features
webhook is a lightweight incoming webhook server to run shell commands
Identity-aware VPN and proxy for remote access to anything, anywhere.
PoC shadow SaaS and insecure credential detection system using a browser extension.
Push docker images directly to remote servers without an external registry
Cluely - The invisible desktop assistant that provides real-time insights, answers, and support during meetings, interviews, presentations, and professional conversations.
Run nested VMs on cloud providers that don't support nested virtualization.
Utils for streaming large files (S3, HDFS, gzip, bz2...)
The recursive internet scanner for hackers. 🧡
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
🕳 bore is a simple CLI tool for making tunnels to localhost
Official QEMU mirror. Please see https://www.qemu.org/contribute/ for how to submit changes to QEMU. Pull Requests are ignored. Please only use release tarballs from the QEMU website.
Weakpass collection of tools for bruteforce and hashcracking
An open source threat modeling tool from OWASP
⚙️ A curated list of static analysis (SAST) tools and linters for all programming languages, config files, build tools, and more. The focus is on tools which improve code quality.
ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing