Stars
Papers from the computer science community to read and discuss.
Network packet processor with a friendly UI for circumventing Deep Packet Inspection (DPI) systems.
ТСПУ: Технические средства противодействия угрозам
cloudbridge-research / masque-vpn
Forked from iselt/masque-vpnEducational MASQUE VPN implementation: CONNECT-IP protocol over QUIC/HTTP3 with REST API, comprehensive testing, and documentation for network protocol research
Anti-spam bot for Telegram and general-purpose anti-spam library and server
Master programming by recreating your favorite technologies from scratch.
A collection of various awesome lists for hackers, pentesters and security researchers
A curated list of various bug bounty tools
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.
This is a resource factory for anyone looking forward to starting bug hunting and would require guidance as a beginner.
PGP verified list of Onion Services (formerly tor hidden services) on the darknet.
Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI
[mirror of https://gitlab.com/veloren/veloren] An open world, open source voxel RPG inspired by Dwarf Fortress and Cube World. This repository is a mirror. Please submit all PRs and issues on our G…
A OSINT tool to obtain a target's phone number just by having his email address
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
MBEDTLS x509 certs parsing and validation subsystem
A set of cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.
A curated list of awesome things related to learning Zero-Knowledge Proofs (ZKP).
Decode binaries and print out which instruction set extensions they use. This program's name is a lie: it supports not just x86/ELF but also ARM64, MachO, and possibly more.
Monero: the secure, private, untraceable cryptocurrency

