A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
-
Updated
Jul 24, 2021 - C
{{ message }}
A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Machine Learning for Cyber Security
Free Security and Hacking eBooks
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
A collection of awesome security hardening guides, tools and other resources
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Penetration Testing notes, resources and scripts
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
Don't let buffer overflows overflow your mind
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Sandia Cyber Omni Tracker (SCOT)
Tool to generate a Linux kernel module for custom rules with Netfilter hooking. (block ports, Hidden mode, functions to protect, etc.)
DNS rebinding toolkit
Wireshark Cheat Sheet
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
An Adavnced Automation Tool For Web-Recon Developed For Linux Systems
A static code analysis for WordPress (and PHP)
A dashboard for a real-time overview of threat intelligence from MISP instances
Greenbone Vulnerability Management Docker Image with OpenVAS
This repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
GUI based offensive penetration testing tool (Open Source)
Who and what to follow in the world of cyber security
Get All Registered Wifi Passwords from Target Computer.
Bringing you the best of the worst files on the Internet.
MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet
Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: the Human Firewall.
Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.
To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."