A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
☆10Jan 7, 2020Updated 6 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A websockets proxy, written in C☆20May 29, 2020Updated 5 years ago
- Shell script blocking DDoS attacks. Not maintained since 2016☆10Oct 21, 2016Updated 9 years ago
- [CCS '23] MicPro: Microphone-based Voice Privacy Protection☆10Nov 7, 2023Updated 2 years ago
- Convert internet traffic to music.☆23Feb 22, 2014Updated 12 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆12Feb 2, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Read Siemens raw data☆14Sep 3, 2024Updated last year
- Attacker can use the scripts to gain reverse shell of a target's machine.☆14Mar 16, 2019Updated 7 years ago
- Advancing Medical Image Segmentation Through Multi-Task and Multi-Scale Contrastive Knowledge Distillation☆20Jun 13, 2024Updated last year
- ☆17May 12, 2026Updated last week
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- Linked Data MCP - A Python-based MCP server for QA over W3C semantic web and linked data standard specifications: RDF, RDFS, SPARQL, OWL,…☆24Mar 3, 2026Updated 2 months ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- What I am reading, what I have read, and what I would like to read. Suggest a book with a PR☆22Feb 1, 2024Updated 2 years ago
- Find the origin of words in every language using a Deep Neural Network trained to create an etymological map.☆22May 18, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- A drone software in MicroPython on Raspberry Pi Pico☆17May 15, 2023Updated 3 years ago
- A simple socket server for jailbroken PS5s that redirects /dev/klog to sockets connected on port 3232☆11Apr 10, 2024Updated 2 years ago
- [arXiv'26 / ICCV'25] Developing Foundation Models for Universal Segmentation from 3D Whole-Body Positron Emission Tomography☆19Mar 14, 2026Updated 2 months ago
- ☆15Jul 1, 2024Updated last year
- Democratizing AI compute through heterogeneous device orchestration☆27Feb 24, 2026Updated 2 months ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆21Mar 16, 2022Updated 4 years ago
- Detect and trap IP scanners☆11Mar 26, 2019Updated 7 years ago
- A simple FTP server for jailbroken PS5s☆18Apr 10, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scrap content from: gelbooru, rule34.xxx, realbooru.com and more.☆16Oct 5, 2024Updated last year
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆16May 17, 2020Updated 6 years ago
- FOR BTC☆12Mar 28, 2022Updated 4 years ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated 3 months ago
- NSA tool hacking☆15May 20, 2018Updated 8 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆13Mar 20, 2024Updated 2 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.☆15Apr 23, 2026Updated 3 weeks ago
- WIP: Hacking on clang-tidy checks and fixes for Bitcoin Core☆11Jul 10, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.☆26Mar 15, 2022Updated 4 years ago
- Golang bindings for macOS / OS X libproc☆15Jan 20, 2018Updated 8 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- Highly configurable dynamic WebSocket bridge☆34Dec 30, 2021Updated 4 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Dec 7, 2022Updated 3 years ago
- This RocketchatApp validates uploaded images against the Microsoft PhotoDNA cloud service and quarantines those identified as child abuse…☆12Nov 17, 2025Updated 6 months ago