Azrood's Stars
awesome-selfhosted/awesome-selfhosted
A list of Free Software network services and web applications which can be hosted on your own servers
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
0xricksanchez/paper_collection
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
rosehgal/BinExp
Linux Binary Exploitation
mandiant/red_team_tool_countermeasures
5h3r10ck/antivirus-evasion
Applying some AV evasion techniques on a metasploit reverse shell
AbdelMoumene-Hadfi/ELFInjector
Segment padding infection technique .
milabs/stamina
(Linux Kernel) Stack Monitoring Tool
MBCProject/mbc-markdown
MBC content in markdown
cfenollosa/os-tutorial
How to create an OS from scratch
KingOfBugbounty/KingOfBugBountyTips
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
choubari/Commandline-Games-hacktoberfest
A repository to share command line games. An opportunity to start and learn about open source code contributions flow.
Ignitetechnologies/CTF-Difficulty
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
AbdelMoumene-Hadfi/ctf_writeups
writeups
pgaijin66/XSS-Payloads
This repository holds all the list of advanced XSS payloads that can be used in penetration testing. These payloads can be loaded into XSS scanners as well.
bats3c/shad0w
A post exploitation framework designed to operate covertly on heavily monitored environments
rmusser01/Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
IBM/fhe-toolkit-linux
IBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
EdOverflow/bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
noraj/OSCP-Exam-Report-Template-Markdown
:orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
avi7611/Oscp-Cheat-Sheet
wew oscp
5h3r10ck/ctf-writeups
codecrafters-io/build-your-own-x
Master programming by recreating your favorite technologies from scratch.
EbookFoundation/free-programming-books
:books: Freely available programming books
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
sherlock-project/sherlock
Hunt down social media accounts by username across social networks
lirantal/awesome-nodejs-security
Awesome Node.js Security resources
choubari/Muslim-App
Daily Muslim Android App that contains Prayer times, Rememberance, Qibla Finder, Zakat Calculator and other features... Project will be migrated to another language.
alphaSeclab/awesome-reverse-engineering
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
labuladong/fucking-algorithm
刷算法全靠套路,认准 labuladong 就够了!English version supported! Crack LeetCode, not only how, but also why.