Lists (1)
Sort Name ascending (A-Z)
Starred repositories
DeepSeek Coder: Let the Code Write Itself
CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.
GoDS (Go Data Structures) - Sets, Lists, Stacks, Maps, Trees, Queues, and much more
A collection of useful, performant, and threadsafe Go datastructures.
A collection of awesome Odin libraries, bindings, software and resources π§ββοΈ
Query anything (CSV, GitHub, etc.) with SQL and visualize your data with any MySQL-compatible BI tool.
Authenticated encrypted API tokens (IETF XChaCha20-Poly1305 AEAD) for Golang
A curated list of awesome Go frameworks, libraries and software
π‘οΈ Open-source and next-generation Web Application Firewall (WAF)
Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
World's most advanced database DevSecOps solution for Developer, Security, DBA and Platform Engineering teams. The GitHub/GitLab for database DevSecOps.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A tool for static analysis, dynamic analysis, and formal verification of RPM packages
π Open source distributed and RESTful search engine.
Convert Security Scanner Output to JUnit Format
Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.
Aho-Corasick string-searching algorithm in Go
βΎ Infisical is the open-source secret management platform: Sync secrets across your team/infrastructure, prevent secret leaks, and manage internal PKI
π A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
Find, verify, and analyze leaked credentials