cmmiller's Stars
danielmiessler/fabric
fabric is an open-source framework for augmenting humans using AI. It provides a modular framework for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
for-GET/http-decision-diagram
An activity diagram to describe the resolution of HTTP response status codes, given various headers.
pi-base/data
A community database of topological counterexamples
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
joswr1ght/nmapsilent
Convert Nmap output for integration with other Project Discovery tools
zappo2/digital-art-with-matlab
MATLAB creating artistic visualizations
weaviate/weaviate
Weaviate is an open-source vector database that stores both objects and vectors, allowing for the combination of vector search with structured filtering with the fault tolerance and scalability of a cloud-native database.
HackingIntoYourHeart/Unoriginal-Rice-Patty
"Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles
aws-samples/aws-modern-application-workshop
A tutorial for developers that want to learn about how to build modern applications on top of AWS. You will build a sample website that leverages infrastructure as code, containers, serverless code functions, CI/CD, and more.
openai/gpt-3
GPT-3: Language Models are Few-Shot Learners
PortSwigger/http-request-smuggler
pysat/pysat
Generalized data analysis workflow via a consistent easy to use interface.
hdm/jarm-go
A Go implementation of JARM
KasperskyLab/klara
Kaspersky's GReAT KLara
SecuraBV/CVE-2020-1472
Test tool for CVE-2020-1472
activecm/rita-legacy
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
alexandreborges/malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
robvandenbrink/Critical-Controls-v7
Implementing the CIS Critical Controls (almost) for Free
fortra/impacket
Impacket is a collection of Python classes for working with network protocols.
openai/gpt-2
Code for the paper "Language Models are Unsupervised Multitask Learners"
tlsfuzzer/python-ecdsa
pure-python ECDSA signature/verification and ECDH key agreement
peewpw/Invoke-PSImage
Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute
dutchcoders/lootbox
Lootbox downloads open directories shared on Twitter.
Cyb3rWard0g/HELK
The Hunting ELK
genuinetools/contained.af
A stupid game for learning about containers, capabilities, and syscalls.
genuinetools/www
This is the public website for genuine tools.
toolswatch/blackhat-arsenal-tools
Official Black Hat Arsenal Security Tools Repository
NetworkDeviceTaxonomy/wifi_taxonomy
Database of known signatures identified using the mechanism in "Passive Taxonomy of Wifi Clients using MLME Frame Contents" from research.google.com/pubs/pub45429.html
bettercap/bettercap
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
microsoft/vscode
Visual Studio Code