- All languages
- APL
- Ada
- Arduino
- Assembly
- Batchfile
- BitBake
- C
- C#
- C++
- CMake
- CSS
- CodeQL
- CoffeeScript
- Common Lisp
- DIGITAL Command Language
- Dockerfile
- F#
- Forth
- Go
- Groovy
- HTML
- Handlebars
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- LLVM
- Lua
- Makefile
- Markdown
- Meson
- OCaml
- PHP
- POV-Ray SDL
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Swift
- TeX
- TypeScript
- V
- VHDL
- Vala
- Verilog
- Vim Script
- Vue
- Wikitext
- XSLT
- Yacc
Starred repositories
Guide to using YubiKey for GnuPG and SSH
Interactively Visualizing Ownership and Borrowing for Rust
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts
This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.
XSS Fuzzer is a tool which generates XSS payloads based on user-defined vectors and fuzzing lists.
Windows Graphics Device Interface (GDI+) fuzzer
Minimal, responsive, SEO ready blogging template built for Jekyll. Demo -
An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).
PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)
Memory game that's been shown to improve working memory.
The home for the Progressive Learning Platform tool