A curated list of awesome start up resources (which are free)
☆49May 11, 2022Updated 3 years ago
Alternatives and similar repositories for awesome-startup
Users that are interested in awesome-startup are comparing it to the libraries listed below
Sorting:
- Awesome list of practices, tools and products especially useful in your startup adventure(s).☆12Sep 19, 2018Updated 7 years ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆39Jan 23, 2026Updated last month
- ☆21Sep 10, 2018Updated 7 years ago
- Modern open source login forms with clean HTM, CSS, JS and no dependencies☆36Aug 5, 2025Updated 7 months ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- Robotics Learning Note☆11Jun 22, 2018Updated 7 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- ☆14Dec 28, 2024Updated last year
- IntegratedML samples to be used as a template☆11Dec 27, 2025Updated 2 months ago
- OWASP Foundation web repository☆16Oct 11, 2025Updated 4 months ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Nov 7, 2017Updated 8 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- ☆14Feb 25, 2026Updated last week
- Repository for the Oulu University Security Engineering course.☆14Sep 12, 2025Updated 5 months ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- black Ip lists, dorks-collection☆16Updated this week
- ☆16Nov 6, 2025Updated 4 months ago
- ☆14Apr 29, 2019Updated 6 years ago
- Apify integration for Zapier☆15Feb 18, 2026Updated 2 weeks ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- A curated list of awesome iOS application security resources.☆11Jan 5, 2024Updated 2 years ago
- all that favours real-time democracy☆15Aug 7, 2022Updated 3 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- Empower developers to do operations.☆14Mar 28, 2018Updated 7 years ago
- ☆10May 28, 2020Updated 5 years ago
- A catalog of interesting clojure.spec repos and gists☆10Apr 4, 2017Updated 8 years ago
- Construct & Recommend trajectories using FYCC100m dataset☆15Mar 16, 2017Updated 8 years ago
- The Kali NetHunter project is the first Open-source Android penetration testing platform for Android devices, allowing for access to the …☆11Sep 19, 2024Updated last year
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Step by step instructions on how to use the Jenkins Kubernetes plugin for different use cases.☆11Aug 9, 2019Updated 6 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- IBM Call For Code☆11Jul 30, 2019Updated 6 years ago