Stars
- All languages
- ASP
- Arduino
- Assembly
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- CoffeeScript
- Common Lisp
- Cuda
- Dockerfile
- Eagle
- Elixir
- Erlang
- F#
- GLSL
- Go
- HTML
- Haskell
- JCL
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- Makefile
- Max
- OCaml
- Objective-C
- PHP
- PLpgSQL
- Pascal
- Perl
- PowerShell
- Prolog
- Python
- QML
- Rich Text Format
- Roff
- Ruby
- Rust
- SaltStack
- Scala
- Scheme
- Self
- Shell
- Smali
- Swift
- Tcl
- TeX
- TypeScript
- VBA
- VHDL
- Vala
- Verilog
- Vim Script
- Visual Basic
- Visual Basic 6.0
- Vue
- XSLT
- YARA
🎬 A curated list of movies every hacker & cyberpunk must watch.
Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.
A short tutorial about building Linux based operating systems.
A repository with 3 tools for pwn'ing websites with .git repositories available
A self-extracting archiving tool for Unix systems, in 100% shell script.
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool…
Platform for emulation and dynamic analysis of Linux-based firmware
Build a database of libc offsets to simplify exploitation
A single Bash script to create blogs. Download, run, write, done!
grep rough audit - source code auditing tool
Script for searching the extracted firmware file system for goodies!
Automatically exported from code.google.com/p/unix-privesc-check
SXKDVM - OSX Docker KVM / Run an OSX KVM virtual machine inside a Docker container.
Rsync-based OSX-like time machine for Linux, MacOS and BSD for atomic and resumable local and remote backups
A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWHF 2018 security conference
Lightweight rootkit implemented by bash shell scripts v0.10
sabotage-linux / sabotage
Forked from pikhq/sabotagea radical and experimental distribution based on musl libc and busybox
Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.
Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)
Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer Overflow