Opinionated defaults, documentation, and workflows for Claude Code at Trail of Bits
☆1,842Apr 2, 2026Updated 2 weeks ago
Alternatives and similar repositories for claude-code-config
Users that are interested in claude-code-config are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows☆4,557Apr 8, 2026Updated last week
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆110Updated this week
- Curated, community-vetted Claude Code plugin marketplace☆359Apr 10, 2026Updated last week
- ☆57Mar 6, 2026Updated last month
- Smart contract exploit proof of concept exploit standard interface☆16Aug 9, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Nextjs RCE Exploit Kit☆148Feb 13, 2026Updated 2 months ago
- ☆15May 1, 2025Updated 11 months ago
- Discover gaps in Entra Conditional Access policies before attackers do☆107Mar 23, 2026Updated 3 weeks ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- Claude Code learns from your corrections: self-correcting memory that compounds over 50+ sessions. Context engineering, parallel worktree…☆1,866Apr 6, 2026Updated last week
- Vyper Deep Dive Notes and Scripts☆25Aug 4, 2023Updated 2 years ago
- ☆53Oct 27, 2025Updated 5 months ago
- A cognitive playbook for experienced smart contract auditors. Structures audit thinking, exploration, validation, and reporting. Not an a…☆41Jan 23, 2026Updated 2 months ago
- Sandboxed devcontainer for running Claude Code in bypass mode safely. Built for security audits and untrusted code review.☆710Apr 9, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Model Context Protocol (MCP) server for programmatic diagram generation using Draw.io (Diagrams.net). This server generates Draw.io XML…☆66Mar 10, 2026Updated last month
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- AWS Quick Start Team☆16Oct 3, 2024Updated last year
- ☆25Jun 13, 2022Updated 3 years ago
- ☆14Nov 25, 2022Updated 3 years ago
- Foundry template repo☆20Mar 9, 2026Updated last month
- ☆127Updated this week
- Secure Coding Rules for Claude Code with a particular emphasis on AIML projects☆108Feb 14, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 8 months ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆111Dec 3, 2025Updated 4 months ago
- C++ SSZ library☆28Jul 11, 2024Updated last year
- Fast, inline geolocation decoration of IPv4 and IPv6 addresses written in Rust☆29Mar 8, 2026Updated last month
- 💅🏽 analyzes your github actions☆98Apr 8, 2026Updated last week
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆48Apr 10, 2026Updated last week
- ADL (Agent Definition Language) is a vendor-neutral, declarative standard for defining AI agents, including their tools, LLM settings, RA…☆97Apr 13, 2026Updated last week
- A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.☆521Apr 8, 2026Updated last week
- Collect IAM information from all your AWS organization, accounts, and resources.☆87Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Assembly implementation of EIP-4788 system contract.☆24Aug 20, 2024Updated last year
- ☆38Jul 3, 2025Updated 9 months ago
- ☆136Updated this week
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆394Jan 23, 2025Updated last year
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year