Lists (1)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP
- Ada
- Assembly
- Batchfile
- BitBake
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Classic ASP
- Clojure
- Dart
- Dockerfile
- GLSL
- Go
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- LLVM
- Liquid
- Lua
- Makefile
- Markdown
- Mathematica
- Nim
- OCaml
- Objective-C
- Open Policy Agent
- PHP
- Pascal
- Perl
- PowerShell
- Prolog
- Python
- QML
- Raku
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Scheme
- Shell
- Smali
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- VBScript
- Vim Script
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zeek
- Zig
LostRuins / koboldcpp
Forked from ggml-org/llama.cppRun GGUF models easily with a KoboldAI UI. One File. Zero Install.
Awesome curated collection of images and prompts generated by gemini-2.5-flash-image (aka Nano Banana) state-of-the-art image generation and editing model. Explore AI generated visuals created with…
Compatibility tool for Steam Play based on Wine and additional components
attacksurge / ax
Forked from pry0cc/axiomThe Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbitrary binaries and scripts using any of our nine supported cl…
SteamOS session compositing window manager
patientx / ComfyUI-Zluda
Forked from comfyanonymous/ComfyUIThe most powerful and modular stable diffusion GUI, api and backend with a graph/nodes interface. Now ZLUDA enhanced for better AMD GPU performance.
mashb1t / Fooocus
Forked from lllyasviel/FooocusFocus even better on prompting and generating
metercai / SimpleSDXL
Forked from lllyasviel/FooocusEnhanced version of Fooocus for SDXL, more suitable for Chinese and Cloud
Champ: Controllable and Consistent Human Image Animation with 3D Parametric Guidance
coffeegist / bofhound
Forked from fortalice/bofhoundGenerate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
Tylous / Freeze.rs
Forked from optiv/Freeze.rsFreeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST
Gourieff / ReActor-UI
Forked from s0md3v/roopFast and Simple Face Swap
runew0lf / RuinedFooocus
Forked from lllyasviel/FooocusFocus on prompting and generating
linikatz is a tool to attack AD on UNIX
nocerainfosec / TakeMyRDP2.0
Forked from d1rkmtrr/TakeMyRDPAn updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contex…
Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after eve…
Dec0ne / PowerSploit
Forked from 0xe7/PowerSploitPowerSploit - A PowerShell Post-Exploitation Framework
n0kovo / awesome-wordlists
Forked from gmelodie/awesome-wordlistsA curated list wordlists for bruteforcing and fuzzing
0xe7 / PowerSploit
Forked from ZeroDayLab/PowerSploitPowerSploit - A PowerShell Post-Exploitation Framework
Flipper Zero firmware source code + Dict attack improvements
PortSwigger / scan-check-builder
Forked from wagiro/BurpBountyBurp Bounty is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.
idaholab / Malcolm
Forked from cisagov/MalcolmMalcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
ThePorgs / impacket
Forked from fortra/impacketImpacket is a collection of Python classes for working with network protocols.
A simple Google Protobuf Decoder for Burp
meitinger / mitmproxy
Forked from mitmproxy/mitmproxyAn interactive TLS-capable intercepting HTTP [& QUIC] proxy for penetration testers and software developers.
xforcered / SQLRecon
Forked from skahwah/SQLReconA C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.