Highlights
- Pro
Lists (1)
Sort Newest
Starred repositories
Dify is an open-source LLM app development platform. Dify's intuitive interface combines AI workflow, RAG pipeline, agent capabilities, model management, observability features and more, letting yo…
FreeAskInternet is a completely free, PRIVATE and LOCALLY running search aggregator & answer generate using MULTI LLMs, without GPU needed. The user can ask a question and the system will make a mu…
This project aim to reproduce Sora (Open AI T2V model), we wish the open source community contribute to this project.
Kali Linux Fixes for Newly Imported VM's
Attack and defend active directory using modern post exploitation adversary tradecraft activity
A curated list of various bug bounty tools
Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydrattack.com), the main idea of which is, based only on the do…
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
🔥 Web-application firewalls (WAFs) from security standpoint.
Check your WAF before an attacker does
pFuzz helps us to bypass web application firewall by using different methods at the same time.
A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection
Open source education content for the researcher community
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, s…
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
A collection of awesome penetration testing resources, tools and other shiny things
Educational, CTF-styled labs for individuals interested in Memory Forensics
40 Algorithms Every Programmer Should Know, published by Packt
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Affordable WiFi hacking platform for testing and learning
🔑 WiFi captive portal for ESP8266 for phishing WiFi passwords