Stars
A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3
🚗 A curated list of resources for learning about vehicle security and car hacking.
Collection of methodology and test case for various web vulnerabilities.
real time face swap and one-click video deepfake with only a single image
A collection of gdb tips. 100 maybe just mean many here.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
Some Pwn Challenges from winesap.
台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.
cwe_checker finds vulnerable patterns in binary executables
BinAbsInspector: Vulnerability Scanner for Binaries
A curated list of awesome social engineering resources.
A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Convolutional neural network for analyzing pentest screenshots
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
中国程序员容易发音错误的单词
Compilation of Resources from TCM's OSINT Course