Pinned Repositories
247ctf
247ctf writeups................
Advent-of-Cyber-2023
THM DESCRIPTION: Get started with Cyber Security in 24 Days - Learn the basics by doing a new, beginner friendly security challenge every day leading up to Christmas.
bootloader
Write a bootloader from scratch..............
BootSector-Snake-game-x86-assembly
Making a bootable snake game in less than 512 bytes with a 16-bit real mode assembly, flat assembler, and Qemu
Change-Kali-Linux-Grub-Background
How to Change Kali Linux Grub Background images
CVE-2011-2523
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
Malware-Analysis-and-Reverse-Engineering
Malware Analysis and Reverse Engineering, Malware Analysis Reports..........
PicoCTF
PicoCTF Write-ups......
Project-OS
Writing an OS nobody ask for..............
Red-Team
A hands-on repository for beginners who want to explore and experiment with red teaming and offensive security methods.
Lynk4's Repositories
Lynk4/PicoCTF
PicoCTF Write-ups......
Lynk4/247ctf
247ctf writeups................
Lynk4/Project-OS
Writing an OS nobody ask for..............
Lynk4/Red-Team
A hands-on repository for beginners who want to explore and experiment with red teaming and offensive security methods.
Lynk4/bootloader
Write a bootloader from scratch..............
Lynk4/BootSector-Snake-game-x86-assembly
Making a bootable snake game in less than 512 bytes with a 16-bit real mode assembly, flat assembler, and Qemu
Lynk4/Change-Kali-Linux-Grub-Background
How to Change Kali Linux Grub Background images
Lynk4/Malware-Analysis-and-Reverse-Engineering
Malware Analysis and Reverse Engineering, Malware Analysis Reports..........
Lynk4/3D-Contour-Plots
Visualise 3d function in 2d using matplotlib and numpy in python
Lynk4/AI-ML
Artificial Intelligence (AI) and Machine Learning (ML) ....;)
Lynk4/Codewars
Solutions of codewars kata`s in Python3
Lynk4/crackmes
A simple reverse engineering challenges to improve your reverse engineering skills.
Lynk4/CryptoZombies
Create your own crypto-collectables game to learn how to develop Solidity smart contracts with CryptoZombies, a free interactive code school.
Lynk4/Digital-Forensics
A report on Digital Forensics Investigation with SOP (Standard Operating Procedure)
Lynk4/Exploit-Development
🛠️ Exploit Development: This repository is a curated collection of low-level exploit examples and shellcode execution techniques. It is designed for cybersecurity researchers, reverse engineers, and students interested in understanding how raw shellcode is constructed, injected, and executed in real environments.
Lynk4/Exposing-Localhost-to-the-Internet
Expose your local network to the World using Ngrok.
Lynk4/HTB-Writeups
HACK THE BOX WRITEUPS..........
Lynk4/Kaggle
This repository houses Python notebooks and scripts that contain solutions to Kaggle competitions.
Lynk4/Lynk4
Lynk4/Malware-Detection
Malware Detection using machine learning
Lynk4/pwnable.kr
'pwnable.kr' is a non-commercial wargame site which provides various pwn challenges regarding system exploitation.
Lynk4/Python-Networking
Python Scripts For Networking.........
Lynk4/ROP-Emporium
Return-oriented programming (ROP)
Lynk4/Sentiment-Analysis
Sentiment Analysis with HuggingFace transformers in Python.
Lynk4/Socket-Programming
Socket Programming is a method to connect two nodes over a network to establish a means of communication between those two nodes. A node represents a computer or a physical device with an internet connection. A socket is the endpoint used for connecting to a node
Lynk4/THM
Try Hack Me Writeups...............
Lynk4/x86-Assembly
low level Assembly Programming...................
Lynk4/your-first-machine-learning-model-in-Python
Create your first machine learning model in python...........
Lynk4/Cloud-Security
Hey there! This repo is my personal playground where I tackle cloud security CTF challenges, mess around with exploits, and stash all my notes and scripts.
Lynk4/maldev-go
MalDev-Go is a hands-on journey into the world of malware development using Go. It focuses on practical experiments with Windows internals, API calls, shellcode execution, and evasion techniques, giving learners a structured path to understand how offensive tooling is built.