🎯
Creating new disturbance to diminish the older ones
Security Researcher | Red Teamer | CTF Player
-
iZOOlogic Inc
- India
- s4ch.github.io
- @Cy5un
- https://keyoxide.org/9981E5A467644468DCF7E569825B551F12B3CB4D
Highlights
Lists (11)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- Astro
- C
- C#
- C++
- CMake
- CSS
- Crystal
- DIGITAL Command Language
- Dockerfile
- Elixir
- Emacs Lisp
- F#
- Go
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- Makefile
- Markdown
- Max
- Nim
- Nix
- OCaml
- Objective-C
- PHP
- POV-Ray SDL
- Perl
- PowerShell
- Python
- QML
- REXX
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Solidity
- Swift
- SystemVerilog
- Tcl
- TeX
- Text
- TypeScript
- VBA
- VBScript
- Verilog
- Vue
- YARA
- reStructuredText
10
stars
written in HTML
Clear filter
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Technically-oriented PDF Collection (Papers, Specs, Decks, Manuals, etc)
Tracking interesting Linux (and UNIX) malware. Send PRs
A memorial site for Hackers and Infosec people who have passed
Enter the domain name once and gather information about it with 33 tools
Android Telephony, RIL, Radio of Modem module
Source code for the official security club of MNIT.