100 private links
Contribute to vulnersCom/trivy-plugin-vulners-db development by creating an account on GitHub.
Recently, I wanted to create a sidebar menu with multiple items/children nesting i.e a multilevel drop-down navigation menu but with a catch: it wasn’t known how many items (and their children), i.e…
Slides and virtual machine for François Fleuret's Deep Learning Course
Powerful yet Compact: Browser-based AI models for a wide array of tasks, designed for optimal efficiency and user-friendliness, ensuring your privacy.
Advanced browser parlor tricks
Backwaren können generell sehr gut eingefroren werden.
The HCL Digital Solutions (DS) Keycloak service is based on Keycloak and adds configuration, an HCL branded login UI and more. It serves as a reference for OIDC based authentication across DS products. - GitHub - HCL-TECH-SOFTWARE/hclds-keycloak: The HCL Digital Solutions (DS) Keycloak service is based on Keycloak and adds configuration, an HCL branded login UI and more. It serves as a reference for OIDC based authentication across DS products.
Learn how to search, query, and modify JSON data with 25 interactive jq examples and explainations
Contribute to Infatoshi/fcc-intro-to-llms development by creating an account on GitHub.
Better quickfix window in Neovim, polish old quickfix window. - GitHub - kevinhwang91/nvim-bqf: Better quickfix window in Neovim, polish old quickfix window.
GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application. - GitHub - GoFetchAD/GoFetch: GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…
Compiled Binaries for Ghostpack (.NET v4.0). Contribute to r3motecontrol/Ghostpack-CompiledBinaries development by creating an account on GitHub.
This project is aimed at providing technical guides on various hacking topics. The most advanced topics are Active Directory and Web services. Other topics will be added. The ultimate goal is centralize all hacking techniques
These are notes about all things focusing on, but not limited to, red teaming and offensive security.
This is a GitBook of mine whose purpose is keeping my pentest notes on hand. It's far from being perfect in terms of organization (that's why I call it "promiscuous") and, basically, I'm logging it for myself, but it turned out that hosting it online makes it most convenient to access. So, if you find it handy too, feel free to use it... responsibly, of course!