Lists (1)
Sort Name ascending (A-Z)
Stars
MIT Deep Learning Book in PDF format (complete and parts) by Ian Goodfellow, Yoshua Bengio and Aaron Courville
Organized list of my malware development resources
Don't let buffer overflows overflow your mind
An archive of low-level CTF challenges developed over the years
Source code for the C++ 20 Masterclass on udemy
The best resources for learning exploit development
Simple workaround for installing Atom Packages when no install paths work!
A collection of awesome security hardening guides, tools and other resources
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, seβ¦
π forkable Ethereum dev stack focused on fast product iterations
Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py
Low code platform for building business apps and workflows in minutes. Supports PostgreSQL, MySQL, MariaDB, MSSQL, MongoDB, Rest API, Docker, K8s, and more π
The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an organization.
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
π© π€π» [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more
Vulnerable server used for learning software exploitation
Reading list for all things startup-related