Highlights
Lists (15)
Sort Name ascending (A-Z)
- All languages
- 1C Enterprise
- ANTLR
- Arduino
- Assembly
- AutoIt
- Awk
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Crystal
- Dart
- Dockerfile
- Eagle
- Elixir
- G-code
- Gherkin
- Go
- Groff
- HCL
- HTML
- Handlebars
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- KiCad Layout
- Kotlin
- Logos
- Lua
- MATLAB
- MDX
- Makefile
- Markdown
- Meson
- Nasal
- Nim
- OCaml
- Objective-C
- OpenEdge ABL
- OpenSCAD
- PHP
- Pascal
- Perl
- PowerShell
- Pug
- Python
- QML
- R
- Racket
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Smali
- Smarty
- Solidity
- Stylus
- Svelte
- Swift
- TeX
- TypeScript
- Vala
- Visual Basic
- Visual Basic .NET
- Visual Basic 6.0
- Vue
- XSLT
- Xojo
Starred repositories
Your self-hosted, globally interconnected microblogging community
Create agents that monitor and act on your behalf. Your agents are standing by!
A privacy-aware, distributed, open source social network.
The ultimate WinRM shell for hacking/pentesting
π Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
π Securely share sensitive information with automatic expiration & deletion after a set number of views or duration. Track who, what and when with full audit logs.
π± Powerfull XSS Scanning and Parameter analysis tool&gem
The Ruby Toolbox library catalog. If you'd like to contribute to the categorizations of Ruby open source projects on the Ruby Toolbox this is the place you can do so π¬π
π A CLI tool to identify the hash type of a given hash.
π© A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.
CLI & library to search for default credentials among thousands of Products / Vendors
nahamsec / intrigue-core
Forked from intrigueio/intrigue-coreIntelligence gathering framework
πͺ A CLI tool and library allowing to simply decode all kind of BigIP cookies.
Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.
Extracting the contents of Microsoft Windows Registry (hive) and display it as a colorful tree but mainly focused on parsing BCD files to extract WIM files path for PXE attacks.
ret2src / OSCP-Exam-Report-Template-Markdown
Forked from Tripex48/OSCP-Exam-Report-Template-Markdownπ Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
noraj / aspisec
Forked from Acceis/aspisecVacuuming out the remnants of offensive tools. AspiSec is responsible for removing the traces and confidential information left by offensive security tools on an auditor's computer in various cacheβ¦
π Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report