Lists (1)
Sort Name ascending (A-Z)
Stars
A CLI that converts natural language to shell commands.
NDN-DPDK: High-Speed Named Data Networking Forwarder
A Model Context Protocol server that provides read-only access to MySQL databases. This server enables LLMs to inspect database schemas and execute read-only queries.
LlamaIndex is the leading document agent and OCR platform
Cloud native networking and network security
Fair-code workflow automation platform with native AI capabilities. Combine visual building with custom code, self-host or cloud, 400+ integrations.
Automated & Manual Wordlists provided by Assetnote
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Weakpass collection of tools for bruteforce and hashcracking
🖥 Effortlessly manage your Linux machine using MQTT.
Official code repo for the O'Reilly Book - "Hands-On Large Language Models"
OSPF MANET Designated Routers implementation (RFCs 5614, 5243, 5838)
Simple to use, blazing fast and thoroughly tested WebSocket client and server for Node.js
The LoRaMesher library implements a distance-vector routing protocol for communicating messages among LoRa nodes.
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
“horst” - lightweight IEEE802.11 wireless LAN analyzer with a text interface
OpenThread released by Google is an open-source implementation of the Thread networking protocol
Collection of comprehensive TypeScript libraries for Interaction with the Ethereum JSON RPC API and utility functions.
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
A vulnerability scanner for container images and filesystems