Highlights
- Pro
Stars
- All languages
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Clojure
- CodeQL
- Crystal
- Cython
- Dockerfile
- Erlang
- F#
- F*
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- MLIR
- Makefile
- Markdown
- Max
- Meson
- NSIS
- Nim
- Nix
- OCaml
- Objective-C
- Objective-C++
- Open Policy Agent
- OpenEdge ABL
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QMake
- R
- REXX
- Raku
- Rebol
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- SMT
- Scala
- Scheme
- Shell
- Standard ML
- Starlark
- Swift
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- VCL
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zeek
An open-source digital image forensic toolset
Th3Inspector 🕵️ Best Tool For Information Gathering 🔎
Authentication, authorization, traceability and auditability for SSH accesses.
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
Next-Generation Linux Kernel Exploit Suggester
Linux Exploit Suggester; based on operating system release number
Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.
Request Tracker, an enterprise-grade issue tracking system
HTTP file upload scanner for Burp Proxy
cisco-auditing-tool : Scans cisco routers for common vulnerabilities
Syslog Sign (id est: rfc5848 implementation) addon for syslog-ng

