- All languages
- Ada
- Agda
- Arc
- Assembly
- Astro
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Common Lisp
- Crystal
- Cython
- Dart
- Dhall
- Dockerfile
- Elm
- Emacs Lisp
- GLSL
- Gherkin
- Git Attributes
- Gleam
- Go
- HCL
- HTML
- Handlebars
- Haskell
- Hy
- Idris
- JSON
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lean
- Lua
- MDX
- Makefile
- Markdown
- Mathematica
- Mercury
- Mermaid
- Nim
- Nix
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Racket
- Raku
- Red
- Ruby
- Rust
- SCSS
- Scala
- Scheme
- Shell
- Solidity
- Starlark
- Svelte
- TSQL
- Tcl
- TeX
- TypeScript
- Vala
- Vim Script
- Vue
- Zig
- sed
Starred repositories
Pre-Built Vulnerable Environments Based on Docker-Compose
Self-Hosting Guide. Learn all about locally hosting (on premises & private web servers) and managing software applications by yourself or your organization. Including Cloud, LLMs, WireGuard, Automa…
Dockerfile best-practices for writing production-worthy Docker images.
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
Docker configuration to quickly setup your own Canarytokens.
Containerized Mopidy MPD (Music Player Daemon) along with Spotify, Google Music... plugins.
Example of scaffolding and tooling for a Python based monorepo
IPsec VPN server with i2p, onion and yggdrasil routing
Docker container for backing up (pg_dump/pg_restore) Postgres DB into AWS S3 bucket