Lists (14)
Sort Name ascending (A-Z)
- All languages
- Assembly
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- CodeQL
- Dockerfile
- GLSL
- Go
- HTML
- Handlebars
- Java
- JavaScript
- Jupyter Notebook
- LLVM
- Logos
- Lua
- MATLAB
- Makefile
- Nim
- Objective-C
- PHP
- POV-Ray SDL
- Pascal
- Perl
- PowerShell
- Python
- REXX
- Roff
- Ruby
- Rust
- Shell
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- Verilog
- Vue
- Wikitext
- XSLT
- YARA
Starred repositories
Style guides for Google-originated open-source projects
Gather and update all available and newest CVEs with their PoC.
Automate the creation of a lab environment complete with security tooling and logging best practices
Tools, tips, tricks, and more for exploring ICS Security.
Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber
Malware samples, analysis exercises and other interesting resources.
Tracking interesting Linux (and UNIX) malware. Send PRs
the transparent ransomware claim tracker 🥷🏼🧅🖥️
Java漏洞学习笔记 Deserialization Vulnerability
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
Awesome list of keywords and artifacts for Threat Hunting sessions
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provi…
Resource assembly of 'Binary Security Tutorial' online course of mine. Video link:https://pan.baidu.com/s/1ltcHIehhLFVFMvru6tGQ8A Passwd:axje
2020年CTF赛题仓库-第一部分
Windows Graphics Device Interface (GDI+) fuzzer
Responsive Command and Control System
Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommen…
nuke86 / ransomFeed
Forked from joshhighet/ransomwatcha ransomware-group dashboard