thesimplezero's starred repositories

AutomatedEmulation

An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.

Language:HCLLicense:MITStargazers:151Issues:0Issues:0

KEV

Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.

License:Apache-2.0Stargazers:503Issues:0Issues:0

tomcter

😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with default credentials.

Language:PythonLicense:MITStargazers:98Issues:0Issues:0

apidetector

APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.

Language:PythonLicense:MITStargazers:265Issues:0Issues:0

datashim

A kubernetes based framework for hassle free handling of datasets

Language:GoLicense:Apache-2.0Stargazers:467Issues:0Issues:0

awesome-api-security

A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.

License:GPL-3.0Stargazers:2865Issues:0Issues:0

fabric

fabric is an open-source framework for augmenting humans using AI. It provides a modular framework for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.

Language:PythonLicense:MITStargazers:19883Issues:0Issues:0

areweesmifiedyet

Are We ESMified Yet?

Language:PythonLicense:NOASSERTIONStargazers:7Issues:0Issues:0

web-check

🕵️‍♂️ All-in-one OSINT tool for analysing any website

Language:TypeScriptLicense:MITStargazers:21254Issues:0Issues:0

foolbox

A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX

Language:PythonLicense:MITStargazers:2699Issues:0Issues:0

ezghsa

EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.

Language:GoLicense:MITStargazers:34Issues:0Issues:0

pythf

Malware detonation platform Polygon integration

Language:PythonLicense:MITStargazers:7Issues:0Issues:0

CryptoVulhub

Analyze and reproduce attack events or vulnerabilities in the blockchain world.

Language:SolidityStargazers:346Issues:0Issues:0

attack-flow

Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.

Language:TypeScriptLicense:Apache-2.0Stargazers:527Issues:0Issues:0

curl

A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET, TFTP, WS and WSS. libcurl offers a myriad of powerful features

Language:CLicense:NOASSERTIONStargazers:34947Issues:0Issues:0

gpt-pilot

The first real AI developer

Language:PythonLicense:NOASSERTIONStargazers:29220Issues:0Issues:0

ligolo-ng

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

Language:GoLicense:GPL-3.0Stargazers:2455Issues:0Issues:0

inferno-os

Inferno® is a distributed operating system. Inferno represents services and resources in a file-like name hierarchy, including devices, network and protocol interfaces, dynamic data sources, and services.Applications are written in a concurrent programming language, Limbo.

Language:CStargazers:527Issues:0Issues:0

marimo

A reactive notebook for Python — run reproducible experiments, execute as a script, deploy as an app, and version with git.

Language:PythonLicense:Apache-2.0Stargazers:5534Issues:0Issues:0

Awesome-Vulnerability-Research

🦄 A curated list of the awesome resources about the Vulnerability Research

License:NOASSERTIONStargazers:1085Issues:0Issues:0

awx

AWX provides a web-based user interface, REST API, and task engine built on top of Ansible. It is one of the upstream projects for Red Hat Ansible Automation Platform.

Language:PythonLicense:NOASSERTIONStargazers:13749Issues:0Issues:0

nginx-ultimate-bad-bot-blocker

Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders

Language:ShellLicense:NOASSERTIONStargazers:3856Issues:0Issues:0

linux_kernel_hacking

Linux Kernel Hacking

Language:CLicense:GPL-2.0Stargazers:599Issues:0Issues:0

tcpjack

TCP Instrumentation

Language:CLicense:Apache-2.0Stargazers:38Issues:0Issues:0

boopkit

Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.

Language:CLicense:Apache-2.0Stargazers:1535Issues:0Issues:0

ultimatevocalremovergui

GUI for a Vocal Remover that uses Deep Neural Networks.

Language:PythonLicense:MITStargazers:16835Issues:0Issues:0
Language:ShellStargazers:56Issues:0Issues:0

evolutionary-architecture-by-example

Navigate the complex landscape of .NET software architecture with our step-by-step, story-like guide. Unpack the interplay between modular monoliths, microservices, domain-driven design, and various architectural patterns. Go beyond the one-size-fits-all solutions and understand how to blend these approaches based on your unique needs.

Language:C#License:MITStargazers:1434Issues:0Issues:0

documents

Papers, presentations and documents from the team at Hacker House.

Language:PerlLicense:NOASSERTIONStargazers:50Issues:0Issues:0

pythia

The hub for EleutherAI's work on interpretability and learning dynamics

Language:Jupyter NotebookLicense:Apache-2.0Stargazers:2163Issues:0Issues:0