xp4ck's Stars
recoilme/b52
b52 is a fast experimental Key/value database. With support for the memcache protocol.
0xFA11/GameNetworkingResources
A Curated List of Multiplayer Game Network Programming Resources
AbdurRKhalid/Design-Patterns
Design Patterns play an important role in the writing of the re-usable object oriented code in the both desktop and web applications. This repository contains all information related to design patterns alongside with implementation in Java.
tmrts/go-patterns
Curated list of Go design patterns, recipes and idioms
nsqio/nsq
A realtime distributed messaging platform
lanjelot/patator
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
dwmkerr/hacker-laws
💻📖 Laws, Theories, Principles and Patterns that developers will find useful. #hackerlaws
theanalyst/awesome-distributed-systems
A curated list to learn about distributed systems
screetsec/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
screetsec/Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
jtpereyda/boofuzz
A fork and successor of the Sulley Fuzzing Framework
brent-stone/CAN_Reverse_Engineering
Automated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol
jollheef/lpe
collection of verified Linux kernel exploits
MozillaSecurity/grizzly
A cross-platform browser fuzzing framework
aiogram/aiogram
aiogram is a modern and fully asynchronous framework for Telegram Bot API written in Python using asyncio
keon/algorithms
Minimal examples of data structures and algorithms in Python
binhnguyennus/awesome-scalability
The Patterns of Scalable, Reliable, and Performant Large-Scale Systems
practical-tutorials/project-based-learning
Curated list of project-based tutorials
minimaxir/big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
recommenders-team/recommenders
Best Practices on Recommendation Systems
malwaredllc/byob
An open-source post-exploitation framework for students, researchers and developers.
mitmproxy/mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
donnemartin/system-design-primer
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
qutebrowser/qutebrowser
A keyboard-driven, vim-like browser based on Python and Qt.
fragglet/c-algorithms
A library of common data structures and algorithms written in C.