Skip to content
View pedrofausto's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report pedrofausto

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Security Linux Assembly Expert

Assembly 1 1 Updated Aug 25, 2015

Livro C in Fork

TeX 1 Updated Aug 26, 2015

Testing, learning and coding ebpf

C 2 Updated Nov 24, 2021

🎓 Path to a free self-taught education in Computer Science!

173,818 22,002 Updated Jan 3, 2025

IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation b…

Java 1,003 223 Updated Jan 3, 2025

Best Practice Auditd Configuration

1,535 269 Updated Oct 16, 2024

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

HTML 4,563 729 Updated Dec 7, 2024

A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.

C 1,389 133 Updated Sep 2, 2022

OpenXuantie - OpenC910 Core

Verilog 1,186 315 Updated Jun 28, 2024

🎓 Um caminho para a educação autodidata em Ciência da Computação!

14,694 1,125 Updated Nov 27, 2024

Scaffolding for BPF application development with libbpf and BPF CO-RE

CMake 1,138 303 Updated Dec 23, 2024

Reverse engineering basics in puzzle form

180 13 Updated May 20, 2020

A curated list of awesome projects related to eBPF.

4,376 374 Updated Jan 2, 2025

Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies

1,819 127 Updated Dec 23, 2024

Incident Response Methodologies

1,024 216 Updated Aug 2, 2018

Small and highly portable detection tests based on MITRE's ATT&CK.

C 10,024 2,840 Updated Jan 3, 2025

Automated Adversary Emulation Platform

Python 5,767 1,098 Updated Dec 23, 2024

A curated list of awesome privilege escalation

1,255 158 Updated Jun 12, 2024

Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (BPF-LSM, AppArmor).

Go 1,625 352 Updated Jan 3, 2025

Materials for Windows Malware Analysis training (volume 1)

Assembly 1,947 190 Updated Jul 1, 2024

Sophos-ReversingLabs 20 million sample dataset

Python 646 133 Updated Apr 7, 2021

A not so awesome list of malware gems for aspiring malware analysts

800 147 Updated Feb 7, 2023

A repository for learning various heap exploitation techniques.

C 7,388 1,157 Updated Nov 27, 2024

My curated list of awesome links, resources and tools on infosec related topics

1,070 136 Updated Jan 3, 2025

😎 Awesome lists about all kinds of interesting topics

340,499 28,205 Updated Dec 12, 2024

A collection of various awesome lists for hackers, pentesters and security researchers

87,342 9,050 Updated Aug 22, 2024

SIMETBox package feed for OpenWRT (comece aqui/start here!)

Makefile 75 13 Updated Aug 21, 2024

Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management

3,081 521 Updated Apr 16, 2021

Simple and powerful web filter for HTTP and HTTPS traffic

Shell 246 24 Updated Dec 19, 2024
Next