Lists (10)
Sort Name ascending (A-Z)
- All languages
- AGS Script
- Assembly
- Astro
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Dart
- Dockerfile
- EJS
- Elixir
- Fluent
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Lua
- MDX
- Makefile
- Markdown
- Mermaid
- Nix
- PHP
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Starlark
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- Vim Script
- Vue
- XSLT
- YAML
- YARA
- Zeek
- Zig
Starred repositories
The fastest path to AI-powered full stack observability, even for lean teams.
A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP…
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
UNIX-like reverse engineering framework and command-line toolset
A little tool to play with Windows security
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Small and highly portable detection tests based on MITRE's ATT&CK.
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
windows-kernel-exploits Windows平台提权漏洞集合
Course materials for Modern Binary Exploitation by RPISEC
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Windows Internals Book 7th edition Tools
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
Abusing impersonation privileges through the "Printer Bug"
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Another Windows Local Privilege Escalation from Service Account to System
[Linux] Two Privilege Escalation techniques abusing sudo token
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.