Stars
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
A collection of modern/faster/saner alternatives to common unix commands.
Supply-chain Levels for Software Artifacts
Cloud Carbon Footprint is a tool to estimate energy use (kilowatt-hours) and carbon emissions (metric tons CO2e) from public cloud usage
The most scalable and customizable permission server on the market. Fix your slow or broken permission system with Google's proven "Zanzibar" approach. Supports ACL, RBAC, and more. Written in Go, …
Spring Authorization Server
UNIX-like reverse engineering framework and command-line toolset.
xlskubectl — a spreadsheet to control your Kubernetes cluster
Red Team K8S Adversary Emulation Based on kubectl
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains use…
JavaCC - a parser generator for building parsers from grammars. It can generate code in Java, C++ and C#.
🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
An open source re-implementation of Diablo 2
A collection of Terraform "core" modules I would consider to be building blocks of any reasonable AWS account setup
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
A series of tutorials about radare2 framework from https://www.megabeets.net
Project HashClash - MD5 & SHA-1 cryptanalysis
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper us…
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Hardware-based attestation / intrusion detection app for Android devices. It provides both local verification with another Android device via QR codes and optional scheduled server-based verificati…