Stars
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Time-Based Detection and Response for Safety-Critical Real-Time Embedded Systems - EDR Kernel Extension for FreeRTOS
Automates repetitive Workday applications by filling in constant information across most portals, including basic contact, education, and demographic information.
LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities
📺 Cross-platform IPTV player application with multiple features, such as support of m3u and m3u8 playlists, favorites, TV guide, TV archive/catchup and more.
A high-quality tool for convert PDF to Markdown and JSON.一站式开源高质量数据提取工具,将PDF转换成Markdown和JSON格式。
Master programming by recreating your favorite technologies from scratch.
Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
A self-hosted dashboard that puts all your feeds in one place
Full-stack framework for building Multi-Agent Systems with memory, knowledge and reasoning.
open-appsec is a machine learning security engine that preemptively and automatically prevents threats against Web Application & APIs. This repo include the main code and logic.
リアルタイムボイスチェンジャー Realtime Voice Changer
List of free GPTs that doesn't require plus subscription
Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be…
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
Apple BLE proximity pairing message spoofing
A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.
Resource types that can be publicly exposed on AWS
Read local Chrome cookies without root or decrypting
a file-sharing tool that allows you to find the responsible person in case of a leakage
Stop Defender Service using C# via Token Impersonation
Bash script to check if a domain or list of domains can be spoofed based in DMARC records
Create tar/zip archives that can exploit directory traversal vulnerabilities