Lists (9)
Sort Name ascending (A-Z)
AI Tools
AWS Hacking Tools
Azure Hacking Tools
Cloud Hacking Tools
Database hacking tool
GCP Tools
Open Source GCP Tools to build off or forkIAM Tools
Tools and ideas to rip off or build upon for IAM Cloud SecK8s Hacking Tools
Stars
Master programming by recreating your favorite technologies from scratch.
freeCodeCamp.org's open-source codebase and curriculum. Learn math, programming, and computer science for free.
📚 Freely available programming books
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
Production-Grade Container Scheduling and Management
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
FastAPI framework, high performance, easy to learn, fast to code, ready for production
🏡 Open source home automation that puts local control and privacy first.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
📚 List of awesome university courses for learning Computer Science!
Bootstrap Kubernetes the hard way. No scripts.
Ray is an AI compute engine. Ray consists of a core distributed runtime and a set of AI Libraries for accelerating ML workloads.
A boilerplate for Node.js web applications
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Principles of Writing Consistent, Idiomatic JavaScript
Cross-platform .NET sample microservices and container based application that runs on Linux Windows and macOS. Powered by .NET 7, Docker Containers and Azure Kubernetes Services. Supports Visual St…
eBPF-based Networking, Security, and Observability
SQL powered operating system instrumentation, monitoring, and analytics.
🥑 Language focused docker images, minus the operating system.
Sample cloud-first application with 10 microservices showcasing Kubernetes, Istio, and gRPC.
The personal information dashboard for your terminal
General-purpose web UI for Kubernetes clusters
Azure Quickstart Templates
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication