Lists (22)
Sort Name ascending (A-Z)
AI
Blockchain
certifications
Cloud
Cryptography
CTF-machines
CVE-list
Docker/K8s
Fuzzing
Go
macOSsec
malware samples
master-thesis
matma
mobile
OSWE
Pentest
pentest-tools
programming
Python
Rust
school
Starred repositories
Open-Source anti-virus suite with real time scanning.
AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
A curated list of awesome Uniswap v4 hooks resources.
Sandbox implemented in GO including containers (namespace, cgroup), ptrace, seccomp
A tool to render a pie chart of memory usage (bytes_memlock) of BPF maps on the system 🥧
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE
awesome list of browser exploitation tutorials
A curated list of awesome browser security learning material.
Automated coverage analysis of WASM executables on embedded and other constrained environments
21 Lessons, Get Started Building with Generative AI
An opensource incident management platform integrating with Slack.
My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.
Super secret 100% practical EVM course. Please do not share
Implementation of the Ethereum Virtual Machine in Rust.
Interesting APT Report Collection And Some Special IOCs
Threadless Process Injection using remote function hooking.
Open Cyber Threat Intelligence Platform
Formalizing Polynomial Commitment Schemes in the Interactive Theorem Prover Isabelle.
A general purpose foundation for cloud-based fuzzing and mutation testing jobs
Ika is a Zero-Trust threshold signature network, implementing 2PC-MPC to ensure the user is cryptographically required to generate a signature. Ika powers the dWallet primitive, a building block th…
eBPF Developer Tutorial: Learning eBPF Step by Step with Examples