Highlights
- Pro
Lists (21)
Sort Name ascending (A-Z)
🌉 1-day / CVE / PoC / Exploit
AI / ML /
Awesome.*
Browser /
🎶 Conference / Slide
Course /
🎲 Course / Assignment / Lab
Crypto
Crypto / PS /
🎯 CTF / Hack
Dev / Profiler / ...
🔮 Etc
🧩 Fuzzing / Analysis / Debugger
Fuzzing, Symbolic Execution, Binary Analysis/Rewrite/Instrumentation, etc.🛠 Hardware / HDL /
hv / cloud / virt / container
🗂 Interesting
Paper
⚙️ Plugin / Config / Utility
Static / Compiler /
🧬 System / Windows / Linux / VM
web3 /
Stars
- All languages
- Agda
- Assembly
- AutoHotkey
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- CodeQL
- CoffeeScript
- Coq
- Crystal
- Cuda
- Dockerfile
- Elixir
- F#
- Fennel
- Go
- HTML
- Java
- JavaScript
- Jsonnet
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- Makefile
- Markdown
- Max
- Meson
- Mojo
- OCaml
- Objective-C
- Objective-C++
- Odin
- PHP
- Pascal
- PowerShell
- Prolog
- Python
- Rich Text Format
- Rocq Prover
- Roff
- Ruby
- Rust
- SMT
- Sage
- Scala
- Shell
- SmPL
- Solidity
- Starlark
- SystemVerilog
- TeX
- TypeScript
- VHDL
- Verilog
- Vim Script
- Vue
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve…
Compilers Principles, Techniques, & Tools (purple dragon book) second edition exercise answers. 编译原理(紫龙书)第2版习题答案。
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
Deadline countdowns for academic conferences in Security and Privacy
7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.
Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts
My notes on software troubleshooting, covering debugging and tracing techniques and tools. Available at wtrace.net.
A full English version of the popular ctf-wiki
✔️ My solutions for CTF & wargame challenges
*For research purposes only*. Some proof of concept code to trig vulnerability or exploit them that I found before.
An archive for decomissioned Z3 docs and IPython Notebooks referenced in my blog post concering Practical Binary Analysis.
Solution to the CMU Binary Bomblab using concolic execution (Angr framework by Shellphish).