- All languages
- ASP
- ActionScript
- Arduino
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- CodeQL
- Dart
- Dockerfile
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Less
- Lua
- Makefile
- Mask
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- Scala
- Shell
- Smali
- Smarty
- Standard ML
- Swift
- TeX
- TypeScript
- VBA
- VBScript
- Vim Script
- Visual Basic
- Vue
- XSLT
- YARA
- Zeek
Starred repositories
real time face swap and one-click video deepfake with only a single image
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Hunt down social media accounts by username across social networks
The world's simplest facial recognition api for Python and the command line
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Federated query engine for AI - The only MCP Server you'll ever need
Fully open reproduction of DeepSeek-R1
☁️ Build multimodal AI applications with cloud-native stack
Xiaomi Home Integration for Home Assistant
Build resilient language agents as graphs.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
GUI for ChatGPT API and many LLMs. Supports agents, file-based QA, GPT finetuning and query with web search. All with a neat UI.
Impacket is a collection of Python classes for working with network protocols.
E-mails, subdomains and names Harvester - OSINT
Llama中文社区,实时汇总最新Llama学习资料,构建最好的中文Llama大模型开源生态,完全开源可商用
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Fast subdomains enumeration tool for penetration testers
an awesome list of honeypot resources
An open-source post-exploitation framework for students, researchers and developers.
A swiss army knife for pentesting networks