Block or Report
Block or report MxEShell
Contact GitHub support about this userβs behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
Free Introduction to Bash Scripting eBook
POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.
text language for writing ios shortcuts faster
Learn how to connect your Flexispot (LoctekMotion) desk to the internet. This repository contains a collection of scripts to get your started, combined with research and instructions.
A long list of App URLs for iOS, macOS and Android
PADD (formerly Chronometer2) is a more expansive version of the original chronometer.sh that is included with Pi-Hole. PADD provides in-depth information about your Pi-hole.
Guide to creating a Pi-Hole (DNS/DHCP server that blocks ads network-wide!)
Indicators from Amnesty International's investigations
Source code for 'Beginning Google Maps API 3' by Gabriel Svennerberg
Transform your Org mode files into stunning HTML documents in minutes with our Org mode HTML theme. Elevate your productivity and impress your readers! #orgmode #html #theme #productivity #design
Simple.css is a CSS template that allows you to make a good looking website really quickly.
Large language model code completion for Emacs
Public open-source code of malware Stuxnet (aka MyRTUs).
Got Your Back (GYB) is a command line tool for backing up your Gmail messages to your computer using Gmail's API over HTTPS.
DevOps Roadmap for 2024. with learning resources
Your shell history: synced, queryable, and in context
A collection of several hundred online tools for OSINT
FUSE extends macOS by adding support for user space file systems
CISA's catalog of bad practices that are exceptionally risky.
Exchange Server support tools and scripts
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
World's fastest and most advanced password recovery utility
Automatic SQL injection and database takeover tool
A collection of sources of indicators of compromise.