Highlights
Stars
Paper2Agent is a multi-agent AI system that automatically transforms research papers into interactive AI agents with minimal human input.
The financial transactions database designed for mission critical safety and performance.
Allows adding extensions from chrome web store on ungoogled-chromium. Also adds semi-automatic extension updating.
Google Chromium, sans integration with Google
DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forensics, Incident Response, Malware Analysis and Threat Hunting.
Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.
This repository showcases various advanced techniques for Retrieval-Augmented Generation (RAG) systems. RAG systems combine information retrieval with generative models to provide accurate and cont…
This tool downloads, installs, and configures a shiny new copy of Chromium.
C and Python training from our Vulnerability Researcher Development Program (VRDP)
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
CogniCrypt_SAST: CrySL-to-Static Analysis Compiler
Open Source DeepWiki: AI-Powered Wiki Generator for GitHub/Gitlab/Bitbucket Repositories. Join the discord: https://discord.gg/gMwThUMeme
Focused malicious code detection ruleset, with a high protection-to-noise ratio
CLI to explain shell commands using explainshell.com
This project aims to maintain Wappalyzer technologies
Audit your Node version for known CVEs and patches
🔥Highlighting the top ML papers every week.
Free, simple, fast interactive diagrams for any GitHub repository
Bare metal to production ready in mins; your own fly server on your VPS.
A self-hostable bookmark-everything app (links, notes and images) with AI-based automatic tagging and full text search
Modern, Streamlined, Free and Open Source Customer Service Software
A simple yet powerful tool to turn traditional container/OS images into unprivileged sandboxes.
Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report




