ByteHackr's Stars
microsoft/ML-For-Beginners
12 weeks, 26 lessons, 52 quizzes, classic Machine Learning for all
sickcodes/Docker-OSX
Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
WerWolv/ImHex
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
meta-llama/llama3
The official Meta Llama 3 GitHub site
ashishps1/awesome-system-design-resources
Learn System Design concepts and prepare for interviews using free resources.
GreyDGL/PentestGPT
A GPT-empowered penetration testing tool
HavocFramework/Havoc
The Havoc Framework.
A-poc/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
DefectDojo/django-DefectDojo
DevSecOps, ASPM, Vulnerability Management. All on one platform.
riscv/riscv-isa-manual
RISC-V Instruction Set Manual
namhyung/uftrace
Function graph tracer for C/C++/Rust/Python
hacksysteam/HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
skills/secure-code-game
A GitHub Security Lab initiative, providing an in-repo learning experience, where learners secure intentionally vulnerable code.
bsauce/kernel-exploit-factory
Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.
mrwadams/attackgen
AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details.
kargisimos/offensive-bookmarks
A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just interested in infosec topics.
gojue/ebpf-slide
Collection of Linux eBPF slides/documents.
tlsfuzzer/tlsfuzzer
SSL and TLS protocol test suite and fuzzer
TURROKS/CVE_Prioritizer
Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed about the latest trends.
riscv/learn
Tracking RISC-V Actions on Education, Training, Courses, Monitorships, etc.
JohnLaTwC/Shared
Shared Blogs and Notebooks
jpanther/lynx
A simple links theme for Hugo built with Tailwind CSS.
google/vxsig
Automatically generate AV byte signatures from sets of similar binaries.
lasq88/LearingMaterials
Different learning materials
RedHatOfficial/rhelai-dev-preview
Red Hat Enterprise Linux AI -- Developer Preview
redhat-infosec/priority-intelligence-requirements-dev
This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements
retis-org/retis
Tracing packets in the Linux networking stack & friends
100DaysofYARA/2023
Rules Shared by the Community from 100 Days of YARA 2023
nearform/owasp-top-ten-workshop
NearForm OWASP Top Ten Security Vulnerabilities Workshop
vdanen/vex-reader
Utility to read Red Hat VEX files