Lists (2)
Sort Name ascending (A-Z)
Stars
CP4 Free Source Code Project (C++17, Java11, Python3 and OCaml)
This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location
CSPBypass.com, a tool designed to help ethical hackers bypass restrictive Content Security Policies (CSP) and exploit XSS (Cross-Site Scripting) vulnerabilities on sites where injections are blocke…
FAUST Gameserver for attack-defense CTFs
Dynamic unpacker and import fixer for Themida/WinLicense 2.x and 3.x.
A summary and solutions for 200+ CTF blockchain challenges
My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.
This repository contains the setup from Paradigm CTF blockchain challenges based on the original repository. We've introduced new features, including a web interface and additional challenge setup.
Search engine for CTF writeups with instant results.
Foundry-like interface for interacting with the Ethereum application in python with extra features for solving CTF Challenges using the web3 module
Useful n8n resources: list of community nodes and tutorials
This repository contains a curated collection of 300+ case studies from over 80 companies, detailing practical applications and insights into machine learning (ML) system design. The contents are o…
OSINT cheat sheet, list OSINT tools, wiki, dataset, article, book , red team OSINT for hackers and OSINT tips and OSINT branch. This repository will grow every time will research, there is a resear…
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
Interactive deep learning book with multi-framework code, math, and discussions. Adopted at 500 universities from 70 countries including Stanford, MIT, Harvard, and Cambridge.
Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.
Main Book repository for the Parallel and High Performance Computing book, Manning Publications
Attack & Defense CTF Farm based on DestructiveFarm
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
SEETF 2022 Public Challenge Files, Sources, and Solutions