mckaywrigley / cursor-course-2View external linksLinks
☆28Feb 27, 2025Updated 11 months ago
Alternatives and similar repositories for cursor-course-2
Users that are interested in cursor-course-2 are comparing it to the libraries listed below
Sorting:
- ☆24Oct 21, 2024Updated last year
- Build a level 1 coding agent.☆17Jan 28, 2025Updated last year
- AI Assistant for interviews & exams — helps capture questions and generate quick, smart answers.☆28Jan 14, 2026Updated last month
- Source code for the Todo App from Section 2 of "Building Full-Stack Apps with AI" on Takeoff.☆25Sep 6, 2024Updated last year
- ☆10Apr 20, 2022Updated 3 years ago
- ☆11Apr 11, 2025Updated 10 months ago
- ☆11May 17, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆13Jun 28, 2025Updated 7 months ago
- Concurrent Pandas is a Python Library that allows you to use Pandas to concurrently download bulk data using threads or processes.☆14Sep 16, 2020Updated 5 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- nacos 任意文件读写☆11Aug 29, 2024Updated last year
- Fully Automated Nim Packages Security Audit☆11Updated this week
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆10Feb 14, 2023Updated 3 years ago
- Simple Chatbot for testing AI Red Team tooling☆16Feb 11, 2025Updated last year
- ResetRyder - Open Source Brute Force Password Reset Tool☆17Mar 10, 2025Updated 11 months ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆17Mar 19, 2025Updated 10 months ago
- Agentic Artifacts is a tool for generating and managing CodeSandbox artifacts using AI. It leverages the power of Ai to create React comp…☆13Jun 24, 2024Updated last year
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆19Mar 22, 2025Updated 10 months ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Feb 3, 2024Updated 2 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Aug 26, 2022Updated 3 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- Tools for multilanguage & Markdown multilang☆11Apr 21, 2024Updated last year
- Recursive Credit Card Searcher For Windows C++ and Linux☆13Jan 10, 2020Updated 6 years ago
- ZAP Website☆20Updated this week
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆32Apr 28, 2025Updated 9 months ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 7 months ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 3 months ago
- My public talks☆14Oct 1, 2024Updated last year
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆16Apr 11, 2022Updated 3 years ago
- A small collection of AWS utilities, packaged as a single standalone binary.☆13Aug 23, 2023Updated 2 years ago
- ☆13May 13, 2024Updated last year
- Config and Secret management across multiple implementations in a uniform way. Inc. AWS SecretsManager/ParameterStore, GCP Secrets, Azure…☆22Updated this week
- ☆54Feb 8, 2025Updated last year
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 8 years ago