Highlights
Lists (32)
Sort Name ascending (A-Z)
🕵️ OSINT
🧊 3D
🤖 AI
📱Android
📜 Awesome
🟠 Censys
🖼 CSS
🐳 Docker
📕 Documentaion
😈 Domain Takeover
🎓 Education
🟦 Extensions
🌐 FastAPI
🔥 Firebase
flake8
🐬 Flipper
🟦 Flutter
🍯 Honeypot
📱iOS
👨💻 JavaScript
👨💻 macOS
🛂 Passwords
pre-commit
pytest
🛡 React
📱 React Native
↔️ REST
🕵️♂️ Security
💻 Shell
🟩 Splunk
🪜 Template
🟪 Terraform
- All languages
- ANTLR
- ActionScript
- AppleScript
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Clojure
- Dart
- Dockerfile
- Elixir
- Gherkin
- Git Attributes
- Go
- Groovy
- HCL
- HTML
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Logos
- Lua
- MDX
- Makefile
- Markdown
- Mojo
- OCaml
- Objective-C
- Objective-C++
- PHP
- Perl
- PowerShell
- Python
- R
- REXX
- Roff
- Ruby
- Rust
- SCSS
- Sass
- Scala
- Shell
- Smarty
- Solidity
- Starlark
- Svelte
- Swift
- TeX
- TypeScript
- V
- Vue
- YARA
- Zig
- jq
Starred repositories
Proxmox VE Helper-Scripts (Community Edition)
Research about recently wide spread discord trojan
Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Preservation of iPod Clickwheel Games for iPod Nanos 3g to 5g and iPod Classics 5g to 7g
Kali Linux Phosh for PinePhone/Pro and other QCOM Mainlined Devices
Meta + Rayban Glasses whatsapp bot integration
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Malware/IOC ingestion and processing engine
📜 A collection of wordlists for many different usages
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
Open source C2 server created for stealth red team operations
MeshAgent used along with MeshCentral to remotely manage computers. Many variations of the background management agent are included as binaries in the MeshCentral project.
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …
Poseidon is a Golang agent targeting Linux and macOS
Lena's scripts/code/resources for malware analysis
Defences against Cobalt Strike
Malware Configuration Extraction Modules
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, si…
A curation of awesome tools, documents and projects about LLM Security.
Made to be used with Flipper just drag the folder into NFC
Our LoRa + Meshtastic how-to guide for beginners
A collection of Flipper Zero sub files
Simple but effective widget which pulls data from your Overseerr server and displays the number of pending requests, number of open issues and whether there is a Overseerr update available