Stars
A repository for learning various heap exploitation techniques.
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
A curated list of CTF frameworks, libraries, resources and softwares
Pre-Built Vulnerable Environments Based on Docker-Compose
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
镜像:https://scaffrey.coding.net/p/hosts/git / https://git.qvq.network/googlehosts/hosts
Automatic SQL injection and database takeover tool
How to Make a Computer Operating System in C++
Extensive Open-Source Guides for Android Developers
😮 Core Interview Questions & Answers For Experienced Java(Backend) Developers | 互联网 Java 工程师进阶知识完全扫盲:涵盖高并发、分布式、高可用、微服务、海量数据处理等领域知识
An opinionated list of awesome Python frameworks, libraries, software and resources.
Ghidra is a software reverse engineering (SRE) framework
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
A collection of links related to Linux kernel security and exploitation
A collection of android security related resources
Windows Internals Book 7th edition Tools
MIT视频公开课《计算机程序的构造和解释》中文化项目及课程学习资料搜集。
TeachYourselfCS 的中文翻译 | A Chinese translation of TeachYourselfCS
Master programming by recreating your favorite technologies from scratch.
🎓 Path to a free self-taught education in Computer Science!