Lists (10)
Sort Name ascending (A-Z)
- All languages
- AGS Script
- Assembly
- Astro
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Dart
- Dockerfile
- EJS
- Elixir
- Fluent
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Lua
- MDX
- Makefile
- Markdown
- Mermaid
- Nix
- PHP
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Starlark
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- Vim Script
- Vue
- XSLT
- YAML
- YARA
- Zeek
- Zig
Starred repositories
🎓 Path to a free self-taught education in Computer Science!
A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
A curated list of awesome warez and piracy links
A list of public penetration test reports published by several consulting firms and academic security groups.
DevOps Guide - Development to Production all configurations with basic notes to debug efficiently.
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
8 Lessons, Kick-start Your Cybersecurity Learning.
A complete web-based remote monitoring and management web site. Once setup you can install agents and perform remote desktop session to devices on the local network or over the Internet.
A general purpose HTTP reverse proxy and forwarding tool. Now written in Go!
Automate the creation of a lab environment complete with security tooling and logging best practices
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
A curated list of insanely awesome libraries, packages and resources for systematic trading. Crypto, Stock, Futures, Options, CFDs, FX, and more | 量化交易 | 量化投资
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
A guide to modern front-end web development / engineering.
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
These are my checklists which I use during my hunting.
A python module for working with ATT&CK
A living document for penetration testing and offensive security.
a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.