-
Microsoft
- 169.254.0.1
- https://parsiya.net
- @CryptoGangsta
- @parsiya@infosec.exchange
- @parsiya.bsky.social
Lists (8)
Sort Name ascending (A-Z)
AI
Throw shit at models and see what happens.API
Flipper
Fuzzing
Throw shit at software and see what happens.Games
Related to videogamesRustacean Matchmaking
Fearless Concurrency!!1!Semgrep
The future of static analysisStatic Analysis
Because I failed at reverse engineering!Stars
- All languages
- ANTLR
- Assembly
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CSS
- CodeQL
- Crystal
- Cuda
- Dockerfile
- Emacs Lisp
- Fluent
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jsonnet
- Jupyter Notebook
- Kaitai Struct
- Kotlin
- Lua
- Makefile
- Markdown
- Meson
- OCaml
- PHP
- Pascal
- PostScript
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Solidity
- Swift
- TeX
- TypeScript
- TypeSpec
- VBA
- VBScript
- Vim Script
- Visual Basic
- Visual Basic 6.0
- Vue
A fast, clean, responsive Hugo theme.
Community guide to using YubiKey for GnuPG and SSH - protect secrets with hardware crypto.
A list of public penetration test reports published by several consulting firms and academic security groups.
Automagically reverse-engineer REST APIs via capturing traffic
The most intuitive Static Site CMS designed for SEO-optimized and privacy-focused websites.
Kubernetes website and documentation repo:
The Bibliotheca Anonoma: A wikified library of the internet's treasures. Researching Something Awful, 2channel, 4chan, and other imageboard/textboard communities.
A Nmap XSL implementation with Bootstrap.
Automagical css image gallery in Hugo using shortcodes, with optional lightbox/carousel gadget using PhotoSwipe and jQuery.
Free IDA Pro Binary Auditing Training Material for University Lectures - from http://binary-auditing.com . Contains decrypted/unzipped files along with original zip archive and site's index.html
Materials for the Binary Analysis Workshop presented at NorthSec 2020
An invoice management application built on the MEAN stack with intentional vulnerabilities used to demonstrate insecure configurations and missing or insufficient security controls.
Automatically exported from code.google.com/p/fuzzdb