A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
-
Updated
Mar 5, 2023 - Assembly
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Machine Learning for Cyber Security
A collection of awesome security hardening guides, tools and other resources
Free Security and Hacking eBooks
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Cloud Exploitation Framework 云环境利用框架,方便安全人员在获得 AK 的后续工作
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Tools and Techniques for Blue Team / Incident Response
Nidhogg is an all-in-one simple to use rootkit for red teams.
My cyber security tools
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
Penetration Testing notes, resources and scripts
The Ultimate OSINT and Threat Hunting Framework
Linux kernel module generator for Hidden firewall that follows the rules in the external YAML file.
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.
To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."