Lists (10)
Sort Name ascending (A-Z)
- All languages
- AGS Script
- Assembly
- Astro
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Dart
- Dockerfile
- EJS
- Elixir
- Fluent
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Lua
- MDX
- Makefile
- Markdown
- Mermaid
- Nix
- PHP
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Starlark
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- Vim Script
- Vue
- XSLT
- YAML
- YARA
- Zeek
- Zig
Starred repositories
🎓 Path to a free self-taught education in Computer Science!
A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
A curated list of awesome warez and piracy links
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A list of public penetration test reports published by several consulting firms and academic security groups.
DevOps Guide - Development to Production all configurations with basic notes to debug efficiently.
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
8 Lessons, Kick-start Your Cybersecurity Learning.
A complete web-based remote monitoring and management web site. Once setup you can install agents and perform remote desktop session to devices on the local network or over the Internet.
Automate the creation of a lab environment complete with security tooling and logging best practices
A general purpose HTTP reverse proxy and forwarding tool. Now written in Go!
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
A curated list of insanely awesome libraries, packages and resources for systematic trading. Crypto, Stock, Futures, Options, CFDs, FX, and more | 量化交易 | 量化投资
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
A guide to modern front-end web development / engineering.
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
These are my checklists which I use during my hunting.
A python module for working with ATT&CK
A living document for penetration testing and offensive security.
a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.