Stars
The recursive internet scanner for hackers. 🧡
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.
Inference Llama 2 in several files of pure C but on a C64
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
.NET (WPF and Windows Forms) bindings for the Chromium Embedded Framework
Chromium Embedded Framework (CEF). A simple framework for embedding Chromium-based browsers in other applications.
Neural Networks from Scratch in Python crafted for utilization as teaching resources in graduate courses (Deep Learning, Deep Learning for Computer Vision) delivered by Minh-Chien Trinh at Jeonbuk …
Open source alternative to Auth0 / Firebase Auth / AWS Cognito
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Tool for finding URLs, paths, secrets and generating raw HTTP requests and OpenApi specifications from config files and annotations used in JAR / WAR / APK applications.
Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.
Example programs from "The Go Programming Language"
A security scanner for your LLM agentic workflows
🎧 Open source music client! Available for both desktop & mobile!
A Go language binding for encodeing and decoding data in the bencode format that is used by the BitTorrent peer-to-peer file sharing protocol.
A simple macOS application that will prevent iTunes or Apple Music from launching.
View HTTP/HTTPS requests made by any Linux program
CLI tool to develop, debug and deploy Twilio Functions
Solving the first 100 Project Euler problems using 100 different programming languages!
Source code for OAuth 2 in Action
oauth-labs: an intentionally vulnerable set of OAuth 2.0 labs for security training and learning
latest version of scanners for IIS short filename (8.3) disclosure vulnerability