-
Arizona State University
- Tempe, AZ
- mitchellzakocs.com
Stars
A complete computer science study plan to become a software engineer.
Git Source Code Mirror - This is a publish-only repository but pull requests can be turned into patches to the mailing list via GitGitGadget (https://gitgitgadget.github.io/). Please follow Documen…
Rich is a Python library for rich text and beautiful formatting in the terminal.
⚛️ Fast 3kB React alternative with the same modern API. Components & Virtual DOM.
Run macOS on QEMU/KVM. With OpenCore + Monterey + Ventura + Sonoma support now! Only commercial (paid) support is available now to avoid spammy issues. No Mac system is required.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
a cheat-sheet for mathematical notation in code form
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
A Super Mario 64 decompilation, brought to you by a bunch of clever folks.
A repository for learning various heap exploitation techniques.
A fast, simple, recursive content discovery tool written in Rust.
syzkaller is an unsupervised coverage-guided kernel fuzzer
Course materials for Modern Binary Exploitation by RPISEC
Reverse engineering focusing on x64 Windows.
Porting Windows Dynamic Link Libraries to Linux
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
A curated list of awesome quantum computing learning and developing resources.
A fork of AFL for fuzzing Windows binaries
Source code of a multiple series of tutorials about the hypervisor. Available at: https://rayanfam.com/tutorials
Find active github forks of a repo https://git.io/vSnrC
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-m…
A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)