Lists (26)
Sort Name ascending (A-Z)
🧠AI
4 repositories
🎫BinMagic
11 repositories
🎁book
33 repositories
🧨bypass
anti-vir bypasssssssssss63 repositories
🔍code audit
16 repositories
🔐Cryptography
5 repositories
🛠️Dev-Compilers
4 repositories
🏗️Dev-Frameworks
34 repositories
🛠️Dev-Gadget
27 repositories
🛡️Exploits
19 repositories
🍔ExpResearch
for exploit code learnning21 repositories
🕵️♂️Forensics
24 repositories
✨fuzz
12 repositories
🕶hack
17 repositories
🧪kernel
50 repositories
📕paper
collecting fuzz paper's code4 repositories
🔍Penetration Testing
46 repositories
🎯project
learn how to code4 repositories
🎈redteam
8 repositories
🧪research
1 repository
🔄Reverse Engineering
105 repositories
🛠️Security Tools
14 repositories
🧑💻Social Engineering
6 repositories
🛠useful gadget
20 repositories
🔪ww3
6 repositories
🍉吃瓜
🍉🍉🍉3 repositories
Stars
7
stars
written in HTML
Clear filter
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in gener…
Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts