Cyber Security Enthusiast | Programmer | Stargazer | Music Lover and Creator
- WA, USA
-
11:25
(UTC -08:00) - https://hthompson.dev/
Highlights
- Pro
Lists (30)
Sort Name ascending (A-Z)
Awesome Lists
Awesome Lists that I like.10 repositories
Blacklist/Hosts
Repositories containing blacklists that can be used in firewalls or network filtering tools.5 repositories
Do Something With These
These are repositories I'm contemplating on adding to another list or want to monitor for updates.150 repositories
Github Actions
Github Actions that I've used in my projects.4 repositories
Gnome Extensions
Cool gnome extensions that I use.9 repositories
Language Tools
Language version tools, linters, formatters, and more.9 repositories
Languages/Frameworks
Programming languages and frameworks that I've used.10 repositories
mkdocs Related
A collection of extensions that I've used for mkdocs projects.7 repositories
Neovim Plugins
Neovim/Vim plugins that I use to enhance existing or introduce new features/functionality.10 repositories
Nuxt Modules
Nuxt modules that I use.5 repositories
Package Managers
First and third-party packages managers that I've used. These include ones designed for OSes and programming languages.8 repositories
Reverse Engineering
Tools to perform reverse engineering of compiled programs and code.3 repositories
Security - Active Recon
Tools for performing active reconnaissance against websites and servers.6 repositories
Security - Auditing
Tools for performing security auditing on applications and OSes.2 repositories
Security - Exploit Framework
Penetration testing frameworks designed to exploit vulnerabilities.1 repository
Security - Firewall
Open source firewall applications for various OSes.3 repositories
Security - Hardening
Applications to improve the security of your OS.2 repositories
Security - IDS
IDS (intrusion detection system) applications.4 repositories
Security - Insecure Applications
Web applications designed to be insecure, for penetration testing purposes.2 repositories
Security - OSINT
Tools that fall under the OSINT (Open-Source Intelligence) category.5 repositories
Security - Password Cracking
Tools related password cracking.3 repositories
Security - Payloads/Bypass
Scripts and tools to bypass system protections and gain access to a target system.2 repositories
Security - Privilege Escalation
Scripts and tools to perform privilege escalation.6 repositories
Security - Userland Hacking
Tools to take advantage misconfigurations and vulnerabilities of built-in commands and applications on a user's system.2 repositories
Security - Vulnerabilities
Tools for identifying vulnerabilities in applications and web apps.5 repositories
Security - WAF
WAFs (web application firewall) and rule sets that I've used.3 repositories
Unit Testing
Tools for performing unit testing.2 repositories
Web Applications
Applications I host and use on my website.6 repositories
WebDev Frameworks
Web development frameworks, such as Nuxt, that I've used.8 repositories
Zsh and Vim
Zsh and neovim/vim tools or plugins that I use.8 repositories
Starred repositories
1
star
written in Markdown
Clear filter
Protect your data against global mass surveillance programs.