Lists (10)
Sort Name ascending (A-Z)
- All languages
- AGS Script
- Assembly
- Astro
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Dart
- Dockerfile
- EJS
- Elixir
- Fluent
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Lua
- MDX
- Makefile
- Markdown
- Mermaid
- Nix
- PHP
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Starlark
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- Vim Script
- Vue
- XSLT
- YAML
- YARA
- Zeek
- Zig
Starred repositories
The fastest path to AI-powered full stack observability, even for lean teams.
A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, MQTTS, POP3, POP3S, RTMP, RTMP…
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
UNIX-like reverse engineering framework and command-line toolset
A little tool to play with Windows security
Small and highly portable detection tests based on MITRE's ATT&CK.
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
windows-kernel-exploits Windows平台提权漏洞集合
Arkime is an open source, large scale, full packet capturing, indexing, and database system.
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Course materials for Modern Binary Exploitation by RPISEC
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
Windows Internals Book 7th edition Tools
Abusing impersonation privileges through the "Printer Bug"
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Another Windows Local Privilege Escalation from Service Account to System
[Linux] Two Privilege Escalation techniques abusing sudo token
A FREE comprehensive step-by-step embedded hacking course covering Embedded Software Development to Reverse Engineering.