Lists (22)
Sort Name ascending (A-Z)
AI
Blockchain
certifications
Cloud
Cryptography
CTF-machines
CVE-list
Docker/K8s
Fuzzing
Go
macOSsec
malware samples
master-thesis
matma
mobile
OSWE
Pentest
pentest-tools
programming
Python
Rust
school
Starred repositories
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Automatic SQL injection and database takeover tool
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
Algebraic enhancements for GEMM & AI accelerators
This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects bo…
Blockchain-based federated learning modular framework.
Exploits written while preparing for the OSED exam