// LATEST
Cybersecurity
Tactical Exploitation: When Brute Force Beats Zero-Days in Modern Pentesting
Cybersecurity
MindAPI: The Interactive Mindmap Turning API Security Chaos Into Visual Order
Developer Tools
System 2 Research: Mapping the Bridge Between Cognitive Science and LLM Reasoning
AI Agents
How OpenAPI MCP Server Turns API Specs Into AI-Readable Summaries
Cybersecurity
Nebula: Embedding AI Models Directly Into Penetration Testing Workflows
AI Dev Tools
Counterfit: A Unified CLI for Testing Machine Learning Model Security
Cybersecurity
Azure Network Security Repository: The Unofficial Automation Hub Microsoft Forgot to Advertise
Developer Tools
HTTP Garden: Finding Request Smuggling Bugs by Pitting Servers Against Each Other
Data & Knowledge
MindGraph: Building AI-Powered Knowledge Graphs from Natural Language
Developer Tools
CDNcheck: How ProjectDiscovery Built an Offline CDN Detector That Runs Without API Calls
Developer Tools
awesome-jq: Your Map Through the Surprisingly Vast jq Ecosystem
Developer Tools
Representation Engineering: Controlling LLMs by Reading Their Mind
Cybersecurity
The Security API Directory Every SOC Engineer Should Bookmark
Data & Knowledge
Building Interactive Knowledge Graphs from Text with LLM-Powered Triple Extraction
Data & Knowledge
Building Performant Network Visualizations with force-graph's Canvas-Based Physics Engine
Data & Knowledge
Featureform: Building a Feature Store Without Ripping Out Your Data Stack
Developer Tools
Mentalist: Node-Based Wordlist Generation for Password Cracking
Cybersecurity
Building Your Own Shodan: A Deep Dive into IVRE's Network Reconnaissance Architecture
AI Agents
AdalFlow: Treating LLM Applications Like Neural Networks You Can Train
Cybersecurity
MimiPenguin: Extracting Login Passwords from Linux Desktop Memory
LLM Engineering
Inside Transformer Debugger: How OpenAI's Superalignment Team Traces Neural Circuits
AI Dev Tools
Tplmap: Automating Server-Side Template Injection Exploitation Across 15+ Engines
LLM Engineering
GPT-LLM-Trainer: Fine-Tuning Models With Nothing But a Text Prompt
Cybersecurity