Highlights
- Pro
Lists (4)
Sort Name ascending (A-Z)
Stars
Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more
gpt-oss-120b and gpt-oss-20b are two open-weight language models by OpenAI
Just another AD training, but free.
Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities
Implement a ChatGPT-like LLM in PyTorch from scratch, step by step
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Ingest, parse, and optimize any data format ➡️ from documents to multimedia ➡️ for enhanced compatibility with GenAI frameworks
A modular graph-based Retrieval-Augmented Generation (RAG) system
YOLOv10: Real-Time End-to-End Object Detection [NeurIPS 2024]
An introduction to ARM64 assembly on Apple Silicon Macs
A binary authorization and monitoring system for macOS
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
The recursive internet scanner for hackers. 🧡
Download Samsung firmware from official servers
A guided mutation-based fuzzer for ML-based Web Application Firewalls
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Analyze and help extract older "hidden" versions of a pdf from the current pdf.
Modular Java framework for meta-heuristic optimization
Metaheuristic Optimization framewoRK. Test the generator available at https://generator.mork-optimization.com/
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
jMetal: a framework for multi-objective optimization with metaheuristics
Script for searching the extracted firmware file system for goodies!
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.