Starred repositories
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
A ssh server that knows who you are. $ ssh whoami.filippo.io
A GNU/Linux monitoring and profiling tool focused on single processes.
A public list of open-source challenges from jobs around the world
A curated list of awesome Go frameworks, libraries and software
A list of Free Software network services and web applications which can be hosted on your own servers
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Master programming by recreating your favorite technologies from scratch.
An opinionated list of awesome Python frameworks, libraries, software and resources.
😈Awful AI is a curated list to track current scary usages of AI - hoping to raise awareness
Goes beyond PEP8 to discuss what makes Python code feel great. A Strunk & White for Python.
A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
Identify hardcoded secrets in static structured text
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Slack enumeration and exposed secrets detection tool
Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs.io/en/master/
Useful links, scripts, tools and best practice for Microsoft SQL Server Database
Probabilistic Context Free Grammar (PCFG) password guess generator
gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
secretz, minimizing the large attack surface of Travis CI
Credentials gathering tool automating remote procdump and parse of lsass process.
A utility to safely generate malicious network traffic patterns and evaluate controls.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelistin…
📚 Find your next book to read!
Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Google Dorks. A collection of 13.760 Dorks. Author: Jolanda de Koff