Skip to content
View tx-qi's full-sized avatar
📿
tengah solat subuh
📿
tengah solat subuh
Block or Report

Block or report tx-qi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.

Starred repositories

Showing results

Extracted Yara rules from Windows Defender mpavbase and mpasbase

YARA 178 44 Updated Jul 9, 2024

Interesting APT Report Collection And Some Special IOC

Python 2,313 502 Updated Jul 25, 2024

A short graduate course on cybercrime, cyberespionage, and cyberoperations

74 12 Updated Jul 11, 2024

POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.

Python 99 17 Updated Jul 12, 2024

Awesome Security lists for SOC/CERT/CTI

Python 537 63 Updated Aug 1, 2024

An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.

169 15 Updated Jul 3, 2024

PoC or Exp Of Vulnerability

Python 3 4 Updated Nov 23, 2017

POC for CVE-2024-23897 Jenkins File-Read

Python 9 1 Updated Feb 17, 2024

Slide Deck | Inter-App Collusion: Exploiting the Improper Export of Android Application Components for Privilege Elevation & Credential Theft

2 Updated May 23, 2024

A Framework meant for the exploitation of iOS devices.

Python 180 29 Updated Jun 3, 2021

A subset of PyTorch's neural network modules, written in Python using OpenAI's Triton.

Python 426 18 Updated Jul 22, 2024

We gather Malaysian dataset! https://malaysian-dataset.readthedocs.io/

Jupyter Notebook 293 105 Updated Jul 10, 2024

Collection of forensic tools

Inno Setup 492 52 Updated Jan 25, 2024

IAT Unhooking proof-of-concept

Assembly 26 3 Updated Apr 7, 2024

Get information from RedLine logs

C++ 7 5 Updated Jan 17, 2022

Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber security students and professionals.

Python 38 8 Updated Jul 31, 2023
Python 159 15 Updated Feb 22, 2024

Some of my publicly available Malware analysis and Reverse engineering.

Python 727 145 Updated Jun 3, 2024

A repository of my own Sigma detection rules.

153 24 Updated Mar 26, 2024

For educational purposes only, samples of old & new malware builders including screenshots!

423 114 Updated Jul 31, 2024

A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.

C 113 10 Updated Jul 20, 2024

This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …

C 580 72 Updated Jul 6, 2024

Digital forensics lab course, as offered in FAST NUCES Karachi during Spring 2023.

PHP 269 75 Updated Apr 14, 2023

Kaspersky's GReAT KLara

PHP 688 140 Updated Jul 24, 2024

Cover various security approaches to attack techniques and also provides new discoveries about security breaches.

PowerShell 420 69 Updated Jul 28, 2024

Cloud Native Runtime Security

C++ 7,150 882 Updated Jul 31, 2024

Proof-of-concept code for Android APEX key reuse vulnerability

Shell 75 7 Updated Jan 31, 2024

Various config files obtained during malware analysis

JavaScript 68 13 Updated Oct 31, 2018
Next