Lists (1)
Sort Name ascending (A-Z)
- All languages
- AGS Script
- AsciiDoc
- C
- C#
- C++ 10000
- CSS
- Clojure
- CodeQL
- Dart
- Dockerfile
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Mustache
- Nim
- OCaml
- Objective-C++
- Open Policy Agent
- PHP
- Perl
- PowerShell
- Python
- QML
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Starlark
- Swift
- TeX
- TypeScript
- TypeSpec
- V
- Vue
- Wikitext
- YARA
- Zig
Starred repositories
bitcoinknots / bitcoin
Forked from bitcoin/bitcoinBitcoin Knots enhanced Bitcoin node/wallet software
A secure low code honeypot framework, leveraging AI for System Virtualization.
Code snippets to reproduce MCP tool poisoning attacks.
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.
An all-round MQTT client that provides a structured topic overview
Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale’s …
🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷
Android application for Meshtastic
Meshtastic project website and documentation
Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Lightweight coding agent that runs in your terminal
AWS MCP Servers — helping you get the most out of AWS, wherever you use MCP.
OWASP Foundation web repository
Offensive Kubernetes Threat Matrix -- kubenomicon.com
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
A GitHub Actions Supply Chain CTF / Goat
The Internets #1 Subdomain Takeover Tool
Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Entra ID security configuration reviews.
A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objects, risky assignments, and potential misconfigurations.
M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.
Ray is an AI compute engine. Ray consists of a core distributed runtime and a set of AI Libraries for accelerating ML workloads.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.