chelsea-limboy's Stars
microsoft/PowerToys
Windows system utilities to maximize productivity
0xAX/linux-insides
A little bit about a linux kernel
iovisor/bcc
BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more
drduh/YubiKey-Guide
Guide to using YubiKey for GnuPG and SSH
wtsxDev/reverse-engineering
List of awesome reverse engineering resources
Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
dylanaraps/pure-sh-bible
📖 A collection of pure POSIX sh alternatives to external processes.
rmusser01/Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
decalage2/awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
denji/awesome-http-benchmark
HTTP(S) benchmark tools, testing/debugging, & restAPI (RESTful)
hackerschoice/thc-tips-tricks-hacks-cheat-sheet
Various tips & tricks
cli-guidelines/cli-guidelines
A guide to help you write better command-line programs, taking traditional UNIX principles and updating them for the modern day.
joaocarvalhoopen/How_to_learn_modern_Rust
A guide to the adventurer.
alephdata/aleph
Search and browse documents and data; find the people and companies you look for.
michalmalik/linux-re-101
A collection of resources for linux reverse engineering
kdeldycke/awesome-iam
👤 Identity and Access Management knowledge for cloud platforms
hysnsec/awesome-threat-modelling
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
ForbiddenProgrammer/conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
castrojo/awesome-immutable
A list of resources for people who want to investigate image-based Linux desktops
secynic/ipwhois
Retrieve and parse whois data for IPv4 and IPv6 addresses
forax/java-guide
A guide of modern Java (Java 17)
LearningKijo/SecurityResearcher-Note
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
xalicex/Killers
Exploitation of process killer drivers
zPrototype/bugbounty_stuff
commondataio/awesome-opendata-software
Awesome list of the software tools related to opendata: data catalogs, ingestion tools, data prep tools and so on
esmil/linux
Linux kernel source tree
jassics/awesome-web-hacking
A list of web application security
jassics/awesome-serverless-security
A curated list of awesome serverless security resources such as (e)books, articles, whitepapers, blogs and research papers.
matthewgream/www-securitydigest-org
Security Digest Archives Website (2002)
ThomasKur/websocket-sharp
A C# implementation of the WebSocket protocol client and server