Stars
Collection of Cyber Threat Intelligence sources from the deep and dark web
real time face swap and one-click video deepfake with only a single image
Prompt, run, edit, and deploy full-stack web applications
Real-time face swap for PC streaming or video calls
stackblitz-labs / bolt.diy
Forked from stackblitz/bolt.newPrompt, run, edit, and deploy full-stack web applications using any LLM you want!
This repository compiles code samples and notebooks demonstrating how to use Generative AI on Google Cloud Vertex AI.
The official gpt4free repository | various collection of powerful language models | o4, o3 and deepseek r1, gpt-4.1, gemini 2.5
c6fc / npk
Forked from Coalfire-Research/npkA mostly-serverless distributed hash cracking platform
uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web application…
This repo includes ChatGPT prompt curation to use ChatGPT and other LLM tools better.
A refined ViPER4Android installer.
Search drives for documents containing passwords
pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Combination of wifite + crunch to help you Crack Wifi Passwords
YourDroid / grub2
Forked from rhboot/grub2A slightly edited grub2 for tablets
This program will parse through the Exploit.in database dump and return the specific E-mail addresses and passwords that you are looking for.
kimocoder / wifite2
Forked from derv82/wifite2Rewrite of the popular wireless network auditor, "wifite" - original by @derv82
A collection of custom security tools for quick needs.
Install ADB & FastBoot Tools in Termux!
A script to mine SQLite databases for hidden gems that might be overlooked
FUSE filesystem over Google Drive
A list of useful payloads for Web Application Security and Pentest/CTF
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…