Stars
- All languages
- Astro
- Batchfile
- Bicep
- Bikeshed
- BlitzBasic
- C
- C#
- C++
- CSS
- Clojure
- CodeQL
- CoffeeScript
- Dockerfile
- GCC Machine Description
- Go
- Groovy
- HCL
- HTML
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- OCaml
- Objective-C
- Open Policy Agent
- PHP
- Perl
- PowerShell
- Pug
- Python
- R
- Rich Text Format
- Ruby
- Rust
- SCSS
- Shell
- Smali
- Smarty
- Solidity
- Starlark
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- Vim Script
- Vue
- XSLT
- YARA
Tools to save time when you are using Linkedin
Task driven LLM multi agent framework that gives you the building blocks to create anything you wish
One rule to crack all passwords. or atleast we hope so.
A programming framework for agentic AI 🤖
LLMs build upon Evol Insturct: WizardLM, WizardCoder, WizardMath
An AutoGPT agent that controls Chrome on your desktop
A curated list of network penetration testing tools.
Source code that accompanies the book API Security in Action
Auto_Jobs_Applier_AI_Agent by AIHawk is an AI Agent that automates the jobs application process. Utilizing artificial intelligence, it enables users to apply for multiple jobs in an automated and p…
Automating Playwright steps using ChatGPT.
Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection.
Ever® Demand™ - Open Commerce Platform - https://everdemand.co
Ever® Demand™ - Open Commerce Platform - https://everdemand.co
Youtube Thumbnail Maker is a simple script to make thumbnails for youtube videos. It uses python and bash.
We write your reusable computer vision tools. 💜
Modern, lightweight and multi-cluster Kubernetes GUI. Available on Windows, macOS and Linux.
Opiniated RAG for integrating GenAI in your apps 🧠 Focus on your product rather than the RAG. Easy integration in existing products with customisation! Any LLM: GPT4, Groq, Llama. Any Vectorstore: …
Understanding attack paths is paramount for developing effective cybersecurity strategies. By dissecting potential routes, organizations can implement targeted security measures. These may include …