gyqtc's Stars
firmianay/CTF-All-In-One
CTF竞赛权威指南
firmianay/ctf-book
CTF竞赛权威指南(Pwn篇) 相关资源
firmianay/AFL-Note
AFL代码全注释
firmianay/ghidra-book
《Ghidra权威指南》相关资源
bytedance/appshark
Appshark is a static taint analysis platform to scan vulnerabilities in an Android app.
SCUBSRGroup/Automatic-Exploit-Generation
Something about AEG
QikaiXu/Robot-Maze-Solving
机器人走迷宫,Pytorch,强化学习,DQN。
ycdxsb/PocOrExp_in_Github
Automatically Collect POC or EXP from GitHub by CVE ID. If you are unable to find the POC/EXP on GitHub, you can also check here: https://pocorexps.nsa.im/
qcri/Text2TTP
A Tool for Semantic Ranking for Automated Adversarial Technique Annotation in Security Text
CRISPpp/zju_network
本项目是将过滤低的软路由以及linux改造成高带宽的AP路由器。提供网络认证以及网络聚合和网口数据收集的程序。包括的功能如下:linux开启热点,linux通过bond聚合wan口,linux通过修改route table聚合wan口。编写了一个ebpf/xdp程序用来观察各个网口包流量以及可以对包进行过滤
storyandwine/GEARSage-DGraphFin
unikraft/unikraft
A next-generation cloud native kernel designed to unlock best-in-class performance, security primitives and efficiency savings.
Gallopsled/pwntools
CTF framework and exploit development library
RoderickChan/pwncli
Do pwn by command line
rocky/python-uncompyle6
A cross-version Python bytecode decompiler
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
horsicq/Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
margoseltzer/shellshock-apt
Lotuhu/Page-UAF
Linux kernel privilege escalation techniques
kowainik/learn4haskell
👩🏫 👨🏫 Learn Haskell basics in 4 pull requests
SunWeb3Sec/DeFiHackLabs
Reproduce DeFi hacked incidents using Foundry.
dmlc/dgl
Python package built to ease deep learning on graph, on top of existing DL frameworks.
alex-maleno/Fuzzing-Module
An interactive module to help you learn how to fuzz your first target
binarybrain-009/AUTOATTACKER
AUTOATTACKER IMPLEMENTATION
longld/peda
PEDA - Python Exploit Development Assistance for GDB
pwndbg/pwndbg
Exploit Development and Reverse Engineering with GDB Made Easy
Ostorlab/KEV
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
projectdiscovery/cvemap
Navigate the CVE jungle with ease.
trickest/containers
Automated privilege escalation of the world's most popular Docker images.
trickest/cve
Gather and update all available and newest CVEs with their PoC.