- Kyiv, Ukraine
Lists (3)
Sort Name ascending (A-Z)
- All languages
- ASP
- ActionScript
- Assembly
- Batchfile
- BlitzBasic
- Boo
- Bro
- C
- C#
- C++
- CSS
- Cuda
- D
- Dockerfile
- Elixir
- Erlang
- Forth
- Fortran
- Go
- HCL
- HTML
- Haskell
- Isabelle
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Lua
- MATLAB
- Makefile
- Nim
- Nix
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Prolog
- PureBasic
- Python
- R
- Racket
- Rocq Prover
- Roff
- Ruby
- Rust
- Scala
- Shell
- SmPL
- Starlark
- Tcl
- TeX
- TypeScript
- V
- VBA
- Vim Script
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
Starred repositories
Demonstration of DSPy optimization for Skill.md files
ACE Analyzer for identifying ESC1-8 vulnerabilities (Written by AI)
Video translation and dubbing tool powered by LLMs. The video translator offers 100 language translations and one-click full-process deployment. The video translation output is optimized for platfo…
An open-source, code-first Go toolkit for building, evaluating, and deploying sophisticated AI agents with flexibility and control.
System Level Intelligent Router for Mixture-of-Models
⚡️AI Cloud OS: Open-source enterprise-level AI knowledge base and MCP (model-context-protocol)/A2A (agent-to-agent) management platform with admin UI, user management and Single-Sign-On⚡️, supports…
🤖 The free, Open Source alternative to OpenAI, Claude and others. Self-hosted and local-first. Drop-in replacement for OpenAI, running on consumer-grade hardware. No GPU required. Runs gguf, transf…
Educational collection of LLVM obfuscation passes. (Feel free to use it for your course)
Collection of OPSEC Tradecraft and TTPs for Red Team Operations
Materials for the workshop "Red Team Ops: Havoc 101"
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
Awesome EDR Bypass Resources For Ethical Hacking
"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS
Automated DLL Sideloading Tool With EDR Evasion Capabilities
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Portable Executable reversing tool with a friendly GUI
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
Use Claude Code as the foundation for coding infrastructure, allowing you to decide how to interact with the model while enjoying updates from Anthropic.
PIC shellcode (C/C++) development toolkit designed for malware developers.
FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
A powerfull websites compiler/obfuscator for optimization or intellectual property protection purposes.
JS-Confuser is a JavaScript obfuscation tool to make your programs *impossible* to read.