- All languages
- AGS Script
- ASP
- ActionScript
- Arduino
- Assembly
- Awk
- B4X
- Batchfile
- BitBake
- BlitzBasic
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Common Lisp
- Cuda
- Dart
- Dockerfile
- Eagle
- G-code
- Game Maker Language
- Gnuplot
- Go
- Groff
- HTML
- Haskell
- Java
- JavaScript
- Julia
- Jupyter Notebook
- KiCad Layout
- Kotlin
- Lua
- MATLAB
- MAXScript
- MDX
- Makefile
- Nginx
- Nix
- OCaml
- Objective-C
- OpenEdge ABL
- OpenSCAD
- PHP
- PLSQL
- Pascal
- Perl
- PostScript
- PowerShell
- Processing
- Prolog
- Propeller Spin
- Python
- QMake
- R
- Roff
- Ruby
- Rust
- SCSS
- SWIG
- Scala
- Scheme
- Shell
- Smarty
- Standard ML
- Svelte
- Swift
- SystemVerilog
- Tcl
- TeX
- TypeScript
- VBScript
- VHDL
- Verilog
- Visual Basic
- Vue
- kvlang
- nesC
Starred repositories
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Clone a voice in 5 seconds to generate arbitrary speech in real-time
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Open-source AI agents for penetration testing
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
Exploitation Framework for Embedded Devices
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
A swiss army knife for pentesting networks
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
Useful tool to track location or mobile number
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
« usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.
P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
Continuously jam all wifi clients/routers
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
This program show you IMSI numbers of cellphones around you.
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Made to be used with Flipper just drag the folder into NFC
DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
💤 Kick devices off your network by performing an ARP Spoof attack.