
- My body is on Earth, my mind on Mars
- https://deletethematrix.com
Highlights
Lists (8)
Sort Name ascending (A-Z)
- All languages
- Assembly
- C
- C#
- C++
- CSS
- Dart
- Dockerfile
- Elixir
- Emacs Lisp
- Go
- HTML
- Haskell
- HolyC
- Inno Setup
- Java
- JavaScript
- Julia
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Markdown
- Mustache
- Nix
- Objective-C
- OpenSCAD
- PHP
- Perl
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Solidity
- Svelte
- Swift
- TeX
- Text
- TypeScript
- Vim Script
- Vue
- YARA
Starred repositories
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A natural language interface for computers
Interact with your documents using the power of GPT, 100% privately, no data leaks
Clone a voice in 5 seconds to generate arbitrary speech in real-time
Automatic SQL injection and database takeover tool
State-of-the-art 2D and 3D Face Analysis Project
Google Chromium, sans integration with Google
The ChatGPT Retrieval Plugin lets you easily find personal or work documents by asking questions in natural language.
LLM based autonomous agent that conducts deep local and web research on any topic and generates a long report with citations.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Exploitation Framework for Embedded Devices
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Scapy: the Python-based interactive packet manipulation program & library.
fsociety Hacking Tools Pack – A Penetration Testing Framework
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
AudioGPT: Understanding and Generating Speech, Music, Sound, and Talking Head
An open-source post-exploitation framework for students, researchers and developers.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
The recursive internet scanner for hackers. 🧡
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
🚀 Bring your favorite shell wherever you go through the ssh. Xonsh shell, fish, zsh, osquery and so on.
Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
Automated All-in-One OS Command Injection Exploitation Tool.