onlyonematt's Stars
apache/superset
Apache Superset is a Data Visualization and Data Exploration Platform
mlabonne/llm-course
Course to get into Large Language Models (LLMs) with roadmaps and Colab notebooks.
pyenv/pyenv
Simple Python version management
trufflesecurity/trufflehog
Find, verify, and analyze leaked credentials
openai/swarm
Educational framework exploring ergonomic, lightweight multi-agent orchestration. Managed by OpenAI Solution team.
AI4Finance-Foundation/FinGPT
FinGPT: Open-Source Financial Large Language Models! Revolutionize 🔥 We release the trained model on HuggingFace.
chartdb/chartdb
Database diagrams editor that allows you to visualize and design your DB with a single query.
evilsocket/opensnitch
OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
pypa/pipx
Install and Run Python Applications in Isolated Environments
anthropics/courses
Anthropic's educational courses
circlemind-ai/fast-graphrag
RAG that intelligently adapts to your use case, data, and queries
gracenolan/Notes
CVEProject/cvelist
Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023
aws-samples/claude-prompt-generator
BushidoUK/Ransomware-Tool-Matrix
A resource containing all the tools each ransomware gangs uses
nicolas-hbt/pygraft
Configurable Generation of Synthetic Schemas and Knowledge Graphs at Your Fingertips
SafeBreach-Labs/WindowsDowndate
A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities
HadessCS/Red-team-Interview-Questions
Red team Interview Questions
cisagov/vulnrichment
A repo to conduct vulnerability enrichment.
TupleType/awesome-cicd-attacks
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
muchdogesec/awesome_threat_intel_blogs
A curated list of Awesome Threat Intelligence Blogs
cybershujin/Threat-Actors-use-of-Artifical-Intelligence
BushidoUK/CTI-Analyst-Challenge
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
jstawinski/GitHub-Actions-Attack-Diagram
bellingcat/toolkit
leonov-av/vulristics
Extensible framework for analyzing publicly available information about vulnerabilities
tidalcyber/cyber-threat-profiling
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
theparanoids/PrioritizedRiskRemediation
A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).
PacktPublishing/Data-Analysis-with-Polars
Data Analysis with Polars, Published by Packt
center-for-threat-informed-defense/m3tid
The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activities associated with its practice.