Highlights
- Pro
Lists (8)
Sort Name ascending (A-Z)
Stars
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
⏩ Create, share, and use custom AI code assistants with our open-source IDE extensions and hub of models, rules, prompts, docs, and other building blocks
Access models from OpenAI, Groq, local Ollama, and others by setting llm-router as Cursor's Base URL
Artemis - Interactive Learning with Automated Feedback
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…
GitHub Action to autograde projects based on a configurable set of metrics
OOP course using Java, see https://skeoop.github.io.
WebGoat is a deliberately insecure application
Guidelines for creating a high-quality scientific thesis with tips and examples for layout, figures, and tables
Overview of tools to de-identify, synthesize and work safely with (sensitive) data
This rep. contains my personal educational materials.
Differential privacy implementation in the Java family of languages (Java, Kotlin, Scala etc...)
An awesome list of self-sovereign identity resources.
A curated list of resources related to privacy engineering
A deliberately vulnerable java app for educational purposes
A pedagogically-curated collection of vulnerability demonstrations for undergraduate software engineering students.
Ubuntu, Alpine, Arch, and Fedora based Webtop images, Linux in a web browser supporting popular desktop environments.
Lightweight Java and Android library for integration with Ethereum clients
Hi! Thanks for checking out my tutorial where I walk you through the process of coding a convolutional neural network in java from scratch. After building a network for a university assignment, I d…
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of various awesome lists for hackers, pentesters and security researchers
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
Core smart contracts of Ethereum Follow Protocol
A demo of a decentralized, privacy-friendly web feed