Pinned Repositories
al-khaser
Public malware techniques used in the wild
amoco
yet another tool for analysing binaries
Android-Security-Reference
A W.I.P Android Security Ref
AppContainerSandbox
An example sandbox using AppContainer (Windows 8+)
APTnotes
Various public documents, whitepapers and articles about APT campaigns
AVulnerabilityChecker
Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)
Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
awesome-windows-exploitation
A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom
75F2CC's Repositories
75F2CC/al-khaser
Public malware techniques used in the wild
75F2CC/Android-Security-Reference
A W.I.P Android Security Ref
75F2CC/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
75F2CC/awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
75F2CC/binwalk
Firmware Analysis Tool
75F2CC/BugId
Python script that uses the cBugId module to detect, analyze and id application bugs
75F2CC/cBugId
Python module to detect, analyze and id application bugs
75F2CC/cfg-showcase
Sample programs that illustrate how to use Control Flow Guard, VS2015's control flow integrity implementation
75F2CC/ChakraCore
ChakraCore is the core part of the Chakra Javascript engine that powers Microsoft Edge
75F2CC/CppCoreGuidelines
The C++ Core Guidelines are a set of tried-and-true guidelines, rules, and best practices about coding in C++
75F2CC/DOMPurify
DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:
75F2CC/EdgeHTTP2Fuzzer
Peach Pit for HTTP/2 Targeting Microsoft Edge
75F2CC/exploit-database
The official Exploit Database repository
75F2CC/free-programming-books
:books: Freely available programming books
75F2CC/ida_pdb_loader
IDA PDB Loader
75F2CC/idaplugins-list
A list of IDA Plugins
75F2CC/inVtero.net
inVtero.net: Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
75F2CC/klee
KLEE Symbolic Virtual Machine
75F2CC/lxss
Fun with the Windows Subsystem for Linux (WSL/LXSS)
75F2CC/mitigation-bounty
Later
75F2CC/pdfrw
pdfrw is a pure Python library that reads and writes PDFs
75F2CC/PolyHook
x86/x64 C++ Hooking Library
75F2CC/Process-Dump
Windows tool for dumping malware PE files from memory back to disk for analysis.
75F2CC/PyJFuzz
PyJFuzz - Python JSON Fuzzer
75F2CC/rules
Repository of yara rules
75F2CC/security-guide-for-developers
Security Guide for Developers (实用性开发人员安全须知)
75F2CC/SwishDbgExt
Incident Response & Digital Forensics Debugging Extension
75F2CC/winafl
A fork of AFL for fuzzing Windows binaries
75F2CC/xos
A fast, tiny operating system for the PC.
75F2CC/You-Dont-Know-JS
A book series on JavaScript. @YDKJS on twitter.