Lists (14)
Sort Name ascending (A-Z)
Starred repositories
D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects
Load up Multiple Nordvpn connections and load balance them as a proxy
Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to by…
Advanced JavaScript File Discovery and Analysis Tool
"DeepCode: Open Agentic Coding (Paper2Code & Text2Web & Text2Backend)"
Financial data platform for analysts, quants and AI agents.
Context7 MCP Server -- Up-to-date code documentation for LLMs and AI code editors
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
FULL Augment Code, Claude Code, Cluely, CodeBuddy, Comet, Cursor, Devin AI, Junie, Kiro, Leap.new, Lovable, Manus, NotionAI, Orchids.app, Perplexity, Poke, Qoder, Replit, Same.dev, Trae, Traycer AI…
An experimental cryptocurrency trading system that combines AI-powered analysis with real-time market data and social sentiment monitoring. Features multiple microservices including market monitori…
Autonomous coding agent right in your IDE, capable of creating/editing files, executing commands, using the browser, and more with your permission every step of the way.
Your AI second brain. Self-hostable. Get answers from the web or your docs. Build custom agents, schedule automations, do deep research. Turn any online or local LLM into your personal, autonomous …
An LLM-powered knowledge curation system that researches a topic and generates a full-length report with citations.
CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports 100+ global frameworks with automatic control mapping, incl…
Examples and guides for using the Gemini API
Python APIs for web automation, testing, and bypassing bot-detection with ease.
A terminal utility for intelligent shell command generation
Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.
A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI for various operations.
Searches through git repositories for high entropy strings and secrets, digging deep into commit history
A Python native library containing lots of useful functions to write efficient scripts to hack stuff.
Extract files from any kind of container formats
FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.
APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.
🌐 Make websites accessible for AI agents. Automate tasks online with ease.