Lists (15)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CMake
- CSS
- Clojure
- Crystal
- DIGITAL Command Language
- Dockerfile
- Elixir
- Erlang
- Go
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- NSIS
- Nim
- Objective-C
- OpenEdge ABL
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Smarty
- Svelte
- Swift
- TypeScript
- UnrealScript
- VBA
- Vala
- Visual Basic
- Vue
- XSLT
- YARA
- Zeek
- Zig
Open Source Continuous File Synchronization
Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS
The Prometheus monitoring system and time series database.
A tool for exploring each layer in a docker image
Fabric is an open-source framework for augmenting humans using AI. It provides a modular system for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
A tool for secrets management, encryption as a service, and privileged access management
Network-wide ads & trackers blocking DNS server
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A modern and intuitive terminal-based text editor
The Single Sign-On Multi-Factor portal for web apps, now OpenID Certified™
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Elegant Scraper and Crawler Framework for Golang
Find, verify, and analyze leaked credentials
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Information gathering framework for phone numbers
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
In-depth attack surface mapping and asset discovery
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
Directory/File, DNS and VHost busting tool written in Go
dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.
Fast passive subdomain enumeration tool.
Secure environments for developers and their agents
A vulnerability scanner for container images and filesystems