- Kerajaan Langit
- @tx__qi
Block or Report
Block or report tx-qi
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (1)
Sort Name ascending (A-Z)
Language
Sort by: Recently starred
Starred repositories
Extracted Yara rules from Windows Defender mpavbase and mpasbase
Interesting APT Report Collection And Some Special IOC
A short graduate course on cybercrime, cyberespionage, and cyberoperations
POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
webshell520 / PoC-Exploit
Forked from AV1080p/PoCorExpPoC or Exp Of Vulnerability
Slide Deck | Inter-App Collusion: Exploiting the Improper Export of Android Application Components for Privilege Elevation & Credential Theft
A Framework meant for the exploitation of iOS devices.
A subset of PyTorch's neural network modules, written in Python using OpenAI's Triton.
We gather Malaysian dataset! https://malaysian-dataset.readthedocs.io/
Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber security students and professionals.
Some of my publicly available Malware analysis and Reverse engineering.
For educational purposes only, samples of old & new malware builders including screenshots!
A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …
Digital forensics lab course, as offered in FAST NUCES Karachi during Spring 2023.
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
Proof-of-concept code for Android APEX key reuse vulnerability
Various config files obtained during malware analysis