☆37Mar 7, 2026Updated this week
Alternatives and similar repositories for ai-ide-skills
Users that are interested in ai-ide-skills are comparing it to the libraries listed below
Sorting:
- Vibe Editing – Asynchronous Voice-to-Edit Flow with AI Agents in Cursor (AI Tinkerers Toronto - May 2025 Meetup: AGENTS at Ada)☆11May 22, 2025Updated 9 months ago
- ☆19Jul 14, 2025Updated 7 months ago
- Torresmo config☆16Feb 25, 2026Updated last week
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- Hooking implementations and supporting tools for various coding agents (Claude, Cursor, Gemini, etc)☆81Updated this week
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- Lightweight, model-agnostic chat history compression (trim + summarize) for AI assistants.☆22Sep 14, 2025Updated 5 months ago
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated last year
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming☆15Feb 24, 2024Updated 2 years ago
- This repository is intended as a comprehensive guide to prepare for interviews focused on generative AI. It serves as a one-stop resource…☆11Dec 13, 2024Updated last year
- XSS scanner tool to scan a list of URLs provided in a .txt file for reflected XSS(rxss) vulnerabilities. This tool is designed to efficie…☆14Jun 29, 2024Updated last year
- A "Linkedin Account Manager" software built with Node.js and Cypress.☆12Jan 20, 2023Updated 3 years ago
- ☆17Sep 8, 2025Updated 5 months ago
- ☆47Jan 8, 2026Updated last month
- Lockheed Martin developed utility to combine multiple CycloneDX SBOMs☆13Jan 16, 2023Updated 3 years ago
- Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.☆10Aug 14, 2024Updated last year
- Enhanced version of binaryninja-ollama and without using the ollama Python library☆13Jan 23, 2025Updated last year
- ARCore sample project that visualizes the human heart on a marker and allows to freely place and transform nerve cells.☆12Jul 20, 2020Updated 5 years ago
- A Model Context Protocol (MCP) server for providing code context from git repositories☆24Nov 13, 2025Updated 3 months ago
- ☆10Apr 29, 2022Updated 3 years ago
- ARF is an agentic reliability intelligence platform that separates decision intelligence (OSS) from governed execution (Enterprise), enab…☆19Updated this week
- Applied Static Analysis☆11Aug 26, 2019Updated 6 years ago
- Sovereign Spatial Procedural Knowledge System (K3D): GPU-accelerated AI with procedural sovereignty. Reference implementation for W3C PM-…☆31Updated this week
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 5 months ago
- ☆13Apr 23, 2025Updated 10 months ago
- ☆20Feb 14, 2026Updated 3 weeks ago
- Jonathan Blows Emacs theme (sort of)☆16Jan 26, 2025Updated last year
- Baka Mitai Meme generator using first order motion model☆13Oct 1, 2020Updated 5 years ago
- mini script para procurar oq precisa!☆11Feb 2, 2023Updated 3 years ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 3 months ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reacha…☆57Feb 26, 2026Updated last week
- AWS Attack Path Scanner - Discover privilege escalation paths across 10+ AWS services☆141Dec 4, 2025Updated 3 months ago