Stars
- All languages
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- CoffeeScript
- Cython
- Dockerfile
- Go
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Objective-C
- OpenEdge ABL
- PHP
- Perl
- PowerShell
- Puppet
- Python
- QML
- Ruby
- Rust
- SCSS
- Shell
- Smali
- Swift
- TypeScript
- UnrealScript
- VBA
- VBScript
- Vim Script
- Vue
- XSLT
- YARA
Command-line program to download videos from YouTube.com and other video sites
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Automatic SQL injection and database takeover tool
120+ interactive Python coding interview challenges (algorithms and data structures). Includes Anki flashcards.
🐧 A list of awesome Linux softwares
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.
Impacket is a collection of Python classes for working with network protocols.
Exploitation Framework for Embedded Devices
CTF framework and exploit development library
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the contr…
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Scapy: the Python-based interactive packet manipulation program & library.
fsociety Hacking Tools Pack – A Penetration Testing Framework
Streamlink is a CLI utility which pipes video streams from various services into a video player
Fast subdomains enumeration tool for penetration testers
an awesome list of honeypot resources
A swiss army knife for pentesting networks
Exploit Development and Reverse Engineering with GDB Made Easy
An advanced memory forensics framework
Count the number of people around you 👨👨👦 by monitoring wifi signals 📡
Infection Monkey - An open-source adversary emulation platform
Securely and anonymously share files, host websites, and chat with friends using the Tor network