Awesome
Rust Weaponization for Red Team Engagements.
A curated list of awesome reversing resources
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
# Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS and so forath) and popular applicaiton
Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel CVE debug.
An evolving how-to guide for securing a Linux server.
Karta - source code assisted fast binary matching plugin for IDA
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provi…
Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommen…
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
A curated list of awesome things related to Suricata
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Repository of creating different example suricata data sets
Style guides for Google-originated open-source projects
A collection of resources for linux reverse engineering
2018年初整理的一些内网渗透TIPS,后面更新的慢,所以整理出来希望跟小伙伴们一起更新维护~
Tracking interesting Linux (and UNIX) malware. Send PRs
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Nidhogg is an all-in-one simple to use windows kernel rootkit.
An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.