Lists (16)
Sort Name ascending (A-Z)
💻 App Development
Resources, templates, tools, and technologies for web development.☁️ Cloud
Cloud services and resources. ThErE iS nO cLoUd, It'S jUsT sOmEoNe ElsE's CoMpUtEr. 🤡👨💻 Computer science
Computer science resources, lectures, courses, and learning paths etc.👨🔬 Data Science
Data science, Artificial Intelligence, Machine Learning, Deep Learning resources etc.⚙️ DevOps
DevOps/DevSecOps & SRE tools and resources.📄 Documentation
Guidelines, standards, manuals, release notes, reports, write-ups, FAQs, and reference docs.🔮 Future ideas
Good examples, or templates I can build upon in the near future.✨ Inspiration
Things to explore in the far future, repositories that are intriguing, but don't know whether I could ever be working on them.📚 Learning resources
Workshops, tutorials, examples, guidelines, standards, codes of practice, RFC, roadmaps, discussions or working groups.🐧 Linux
Linux, Linux distros, Linux software, custom dotfiles and rices📱 Mobile
Mobile development & hacking resources, templates and guides etc.📁 My Projects
Projects and repositories I made/work on/worked on.🚀 My stack
Technologies or tools that I use, including implicit dependencies.🖥️ Programming
Resources related to programming, programming (languages, frameworks & libraries), data structures & algorithms.🔒 Security
Anything and everything related to CyberSec, InfoSec & hacking.🌐 Web development
Resources, templates, tools, and technologies for web development.Starred repositories
A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings.
A tool for reverse engineering Android apk files
Various *nix tools built as statically-linked binaries
Collection of steganography tools - helps with CTF challenges
List of the links to the docs for different services, which explain using of advanced search operators
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Easily build Eloquent queries from API requests
Some setup scripts for security research tools.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Automatic SSTI detection tool with interactive interface
CTF101, a wiki-project documenting Capture The Flag techniques.
A linux-based assembly REPL for x86, amd64, armv7, and armv8
A sorted and updated list of security wargame sites.
A dojo to introduce people to pwncollege's features.
CTF framework and exploit development library
React2Shell (CVE-2025-55182) Exploit
list of usernames and email addresses for pentests
An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!
MBCProject / capa-rules-1
Forked from mandiant/capa-rulesStandard collection of rules for capa: the tool for enumerating the capabilities of programs
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…

