Lists (1)
Sort Name ascending (A-Z)
- All languages
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Dockerfile
- Emacs Lisp
- Erlang
- Fluent
- Go
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Logos
- Lua
- MDX
- Markdown
- Meson
- Nim
- Objective-C
- PHP
- PLSQL
- Pascal
- Perl
- PowerShell
- Puppet
- Python
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Swift
- SystemVerilog
- TeX
- TypeScript
- VBA
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
Starred repositories
This repository contains the Hugging Face Agents Course.
A simple, easy-to-hack GraphRAG implementation
A modular graph-based Retrieval-Augmented Generation (RAG) system
One-click deploy of a Knowledge Graph powered RAG (GraphRAG) in Azure
MS-Agent: Lightweight Framework for Empowering Agents with Autonomous Exploration in Complex Task Scenarios
🥑 ArangoDB is a native multi-model database with flexible data models for documents, graphs, and key-values. Build high performance applications using a convenient SQL-like query language or JavaSc…
Open Source CRM based on Django and svektekit
CoffeeShot: Avoid Detection with Memory Injection
The all-in-one browser extension for offensive security professionals 🛠
AI featured threat modeling and security review project
BloodyAD is an Active Directory Privilege Escalation Framework
Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬
Repurpose your YouTube videos by converting them into blog posts.
KQL Queries. Microsoft Defender, Microsoft Sentinel
A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.
List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
Open-source search and retrieval database for AI applications.
A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come from where did you go) in Security Incidents and Threat Hunts
🪢 Open source LLM engineering platform: LLM Observability, metrics, evals, prompt management, playground, datasets. Integrates with OpenTelemetry, Langchain, OpenAI SDK, LiteLLM, and more. 🍊YC W23
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
EXOCET - AV-evading, undetectable, payload delivery tool
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
tldraw / draw-fast
Forked from fal-ai-community/tldraw-falContinuous profiling for analysis of CPU and memory usage, down to the line number and throughout time. Saving infrastructure cost, improving performance, and increasing reliability.