Lists (1)
Sort Name ascending (A-Z)
Stars
mini cli search engine for your docs, knowledge bases, meeting notes, whatever. Tracking current sota approaches while being all local
Agentic AI Infrastructure for magnifying HUMAN capabilities.
One-line security hardening for Ubuntu servers
🔥 The fastest and powerful Python library for Instagram Private API 2026 with HikerAPI SaaS
A tool for hacking into publicly exposed network cameras, with support for specifying country and region.
Collection of publicly available IPTV channels from all over the world
dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.
SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: https://datatracker.ietf.org/doc/draft-michel-ssh3/
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over 10 years with amazing results.
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Exposing phishing kits seen from phishunt.io
Collection of Cyber Threat Intelligence sources from the deep and dark web
Open source templates you can use to bootstrap your security programs
Interactive roadmaps, guides and other educational content to help developers grow in their careers.
This is a macOS hardening to read or set security configuration.
GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Collection of resources related to phishing
Tweet Generation with Huggingface
Tool to find common vulnerabilities in cryptographic public keys
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!