colemanjp's Stars
zylon-ai/private-gpt
Interact with your documents using the power of GPT, 100% privately, no data leaks
dair-ai/Prompt-Engineering-Guide
🐙 Guides, papers, lecture, notebooks and resources for prompt engineering
cloudcommunity/Free-Certifications
A curated list of free courses with certifications. Also available at https://free-certifications.com/
dnSpyEx/dnSpy
Unofficial revival of the well known .NET debugger and assembly editor, dnSpy
dylanaraps/pure-sh-bible
📖 A collection of pure POSIX sh alternatives to external processes.
liuchong/awesome-roadmaps
A curated list of roadmaps.
google/fuzzing
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
arainho/awesome-api-security
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
gracenolan/Notes
protectai/ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
certsocietegenerale/IRM
Incident Response Methodologies 2022
securitytemplates/sectemplates
Open source templates you can use to bootstrap your security programs
fyoorer/ShadowClone
Unleash the power of cloud
jstrosch/learning-malware-analysis
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
HadessCS/Red-team-Interview-Questions
Red team Interview Questions
CERT-Polska/Artemis
A modular vulnerability scanner with automatic report generation capabilities.
JohnLaTwC/Shared
Shared Blogs and Notebooks
irsl/curlshell
reverse shell using curl
jthack/PIPE
Prompt Injection Primer for Engineers
ByteSnipers/awesome-pentest-cheat-sheets
Collection of cheat sheets useful for pentesting
attacksurge/ax
The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbitrary binaries and scripts using any of our eight supported cloud providers!
cisagov/pen-testing-findings
A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that may be discovered during a penetration test.
OWASP/www-project-ai-security-and-privacy-guide
OWASP Foundation Web Respository
AbstractEngine/pentest-muse-cli
tadwhitaker/Security_Architect_and_Principal_Security_Engineer_Interview_Questions
This is a companion to the Security Engineer Questions
efeali/fragtunnel
Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation firewalls en route to the target.
obheda12/JupyterPen
A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks
codesoap/pfuzz
a web fuzzer using the httpipe format
bsysop/servicenow
ServiceNow widge-simple-list misconfiguration scanner
NitinYadav00/gf-patterns
Some of the gf patterns which i use