Lists (5)
Sort Name ascending (A-Z)
Stars
Reverse engineering focusing on x64 Windows.
Top disclosed reports from HackerOne
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
backup (educational) of the mirai bot source and instructions.
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Universal and Transferable Attacks on Aligned Language Models
Collection of macOS persistence methods and miscellaneous tools in JXA
Graphical interface for PortEx, a Portable Executable and Malware Analysis Library
Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness
Kali Linux Fixes for Newly Imported VM's
A tool for checking the security hardening options of the Linux kernel
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teamin…
An evolving how-to guide for securing a Linux server.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Binaries for the book Practical Malware Analysis