Highlights
Lists (1)
Sort Name ascending (A-Z)
- All languages
- Assembly
- Awk
- C
- C#
- C++
- CMake
- CSS
- Classic ASP
- Cython
- D
- Dart
- Dockerfile
- G-code
- Go
- HTML
- Hack
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- LLVM
- MATLAB
- MDX
- Makefile
- Markdown
- Nim
- OCaml
- Objective-C
- Objective-C++
- OpenEdge ABL
- PHP
- PLpgSQL
- Perl
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Shell
- Solidity
- Swift
- TSQL
- TeX
- TypeScript
- Vim Script
- Vue
- WebAssembly
- Wikitext
- YARA
- Zig
Starred repositories
The contents of /mnt/skills in Claude's code interpreter environment
My experiments in weaponizing Nim (https://nim-lang.org/)
This application allows you to generate mathematical animations using natural language descriptions. It uses OpenAI's GPT model to convert your descriptions into Manim code, which is then used to c…
This repository delivers end-to-end, code-first tutorials covering every layer of production-grade GenAI agents, guiding you from spark to scale with proven patterns and reusable blueprints for re…
Ever used asyncio and wished you hadn't? A tiny (~300 lines) event loop for Python.
The Secure Coding Dojo is a platform for delivering secure coding knowledge.
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
OWASP Foundation web repository
A list of cool features of Git and GitHub.
Create committing rules for projects 🚀 auto bump versions ⬆️ and auto changelog generation 📂
分享 GitHub 上有趣、入门级的开源项目。Share interesting, entry-level open source projects on GitHub.
Automate the process of making money online.
The lazier way to manage everything docker
Glances an Eye on your system. A top/htop alternative for GNU/Linux, BSD, Mac OS and Windows operating systems.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
CatSniffer is an original multiprotocol and multiband board for sniffing, communicating, and attacking IoT (Internet of Things) devices using the latest radio IoT protocols. It is a highly portable…
PowerShell tools to help defenders hunt smarter, hunt harder.
Visualization of all roads within any city
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Interact with Tesla vehicles over BLE using ESPHome and Home Assistant
Grokking the Coding Interview: Patterns for Coding Questions Alternative
Curated coding interview preparation materials for busy software engineers