Skip to content
View corest's full-sized avatar

Block or report corest

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.

276 37 Updated Feb 17, 2023

This custom component for Home Assistant will add crucial features to your climate-controlling TRV (Thermostatic Radiator Valves) to save you the work of creating automations to make it smart. It c…

Python 1,022 142 Updated Mar 19, 2025

TECH Controllers integration for Home Assistant

Python 112 71 Updated Feb 19, 2025

21 Lessons, Get Started Building with Generative AI 🔗 https://microsoft.github.io/generative-ai-for-beginners/

Jupyter Notebook 75,753 39,256 Updated Mar 21, 2025

AI on the command line

Go 3,438 142 Updated Mar 24, 2025

Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application

Go 4,630 513 Updated Dec 21, 2024

Think tmux, then aim... lower

Rust 1,278 23 Updated Mar 24, 2025

A CNI meta-plugin for multi-homed pods in Kubernetes

Go 2,531 603 Updated Mar 20, 2025

🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List

6,849 1,761 Updated Jul 18, 2024

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…

C 7,061 644 Updated Jun 8, 2024

A highly experimental exploration of integrating Tailscale and Caddy.

Go 514 53 Updated Feb 7, 2025

Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

C# 527 57 Updated Mar 19, 2024

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 61,605 24,225 Updated Mar 24, 2025

The FLARE team's open-source tool to identify capabilities in executable files.

Python 5,207 596 Updated Mar 21, 2025

A Windows API wrapper package for the Go Programming Language

Go 1,246 323 Updated Sep 25, 2023
PowerShell 1,577 309 Updated Jun 13, 2024

Easy & Flexible Alerting With ElasticSearch

Python 8,011 1,732 Updated Aug 7, 2024

Making it easy to write shell-like scripts in Go

Go 6,508 332 Updated Mar 22, 2025

The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clu…

Go 11,263 483 Updated Mar 24, 2025

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 64,119 15,164 Updated Mar 24, 2025

A little tool to play with Windows security

C 19,934 3,823 Updated Jul 5, 2024

Trying to tame the three-headed dog.

C# 4,353 800 Updated Feb 1, 2025

C# Data Collector for BloodHound

C# 872 190 Updated Mar 13, 2025

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

XSLT 7,395 1,028 Updated Feb 15, 2025

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,402 1,376 Updated Oct 28, 2024

web/print

HTML 64 31 Updated Nov 2, 2024

Manage multiple repository updates all at once.

141 4 Updated Dec 15, 2023

A modern alternative to the watch command, records the differences in execution results and can check this differences at after.

Rust 836 23 Updated Mar 19, 2025

The ultimate WinRM shell for hacking/pentesting

Ruby 4,768 627 Updated Dec 2, 2024
Next