Lists (6)
Sort Name ascending (A-Z)
Stars
A collection of various awesome resources about quantum mechanics, cryptography, computing, and hacking.
My attempt at researching Quantum Mechanics & Quantum Computing when I was a junior.
Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code …
Several PDF analysis reassembled with additional tips and tools
Out of boredom, I was thinking about how to bypass the security on Claude3, which probably has the best protection "against harmful content". And I came up with the idea that when the AI itself kno…
Guaranteed compile-time string literal obfuscation header-only library for C++14
Hello, I just put my Full code of darkweb/hacking news website for everyone, you can change links/photos/names etc. for your own if you want.
Instant voice cloning by MIT and MyShell.
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Code for the paper "Language Models are Unsupervised Multitask Learners"
📙 Amazon Web Services — a practical guide
🤖 Python examples of popular machine learning algorithms with interactive Jupyter demos and math being explained
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
A collection of hacking tools, resources and references to practice ethical hacking.
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
the hacker sends a binary SMS to the target's phone. The SMS contains a special payload executed by the operating system of the phone's SIM card
it is my all notes about topics I've been learned in 4/5 years (mostly hacking)
Minimal examples of data structures and algorithms in Python
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Example code for the book https://www.nostarch.com/gamehacking . PLEASE READ THE README
Leaked source code of the babuk ransomware by VXUG
VBA Obfuscation Tools combined with an MS office document generator
A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.
This repository provides code for modulating radio signals based on mechanical vibrations, demodulating received signals to extract information, and processing demodulated signals to produce sound …
A collection of the code I have written for my YouTube tutorials.
The "DLLHijack Injection" tool enables the injection of malicious DLLs into target processes, allowing for DLL hijacking attacks. This technique can be used to exploit vulnerable applications by re…
Advanced Function Hooking Utility: Seamlessly intercept and manipulate function execution flow. Redirect calls from target functions to custom hooks for dynamic behavior customization with powerful…