Stars
tuxrem / wizarr-ng
Forked from wizarrrr/wizarrWizarr is an advanced user invitation and management system for Jellyfin, Plex, Emby etc.
tuxrem / jellzy
Forked from edde746/plezyModern cross-platform Jellyfin client built with Flutter
swissmakers / infra-manager
Forked from gnmyt/NextermA secure and working open source server management software for SSH, RDP, VNC and Telnet
A simple HTML5, YouTube and Vimeo player
Modern cross-platform Plex client built with Flutter
My AI cohost and companion, all code to be included, 6 different python environments and two esp32 arduino sketches
Golang gRPC Middlewares: interceptor chaining, auth, logging, retries and more.
Open-source, self-hosted note-taking tool built for quick capture. Markdown-native, lightweight, and fully yours.
A headless install of kodi in a container
Have a natural, spoken conversation with AI!
The Free Software Media System - Official Web Client
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Custom firmware for the HackRF SDR + PortaPack H1 addon
GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)
Active Directory and Internal Pentest Cheatsheets
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Automate installation of extra pentest tools on Kali Linux
PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array of encoding options to facilitate thorough security testing …
Tylous / ScareCrow
Forked from optiv/ScareCrowScareCrow - Payload creation framework designed around EDR bypass.
Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)