pirarucu's Stars
ElliotKillick/windows-vs-linux-loader-architecture
Side-by-side comparison of the Windows and Linux (GNU) Loaders
checkcheckzz/system-design-interview
System design interview for IT companies
nickvourd/Windows-Local-Privilege-Escalation-Cookbook
Windows Local Privilege Escalation Cookbook
Coder-World04/Complete-System-Design
This repository contains everything you need to become proficient in System Design
behnamshamshirsaz/CrackMaster
x86/x64 Ring 0/-2 System Freezer/Debugger
Maldev-Academy/HellHall
Performing Indirect Clean Syscalls
Maldev-Academy/MaldevAcademyLdr.1
nick0ve/how-to-bypass-aslr-on-linux-x86_64
ASLR bypass without infoleak
Mr-Un1k0d3r/PowerLessShell
Run PowerShell command without invoking powershell.exe
Anugrahsr/Awesome-web3-Security
A curated list of web3Security materials and resources For Pentesters and Bug Hunters.
RoseSecurity/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
kleiton0x00/Proxy-DLL-Loads
A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.
mytechnotalent/Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
0xsyr0/Awesome-Cybersecurity-Handbooks
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
Bert-JanP/Open-Source-Threat-Intel-Feeds
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.
SaadAhla/UnhookingPatch
Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
CyberSecurityUP/OSCE3-Complete-Guide
OSWE, OSEP, OSED, OSEE
GeostatsGuy/PythonNumericalDemos
Well-documented Python demonstrations for spatial data analytics, geostatistical and machine learning to support my courses.
Yaxser/Backstab
A tool to kill antimalware protected processes
0xsyr0/OSCP
OSCP Cheat Sheet
microsoft/windows-drivers-rs
Platform that enables Windows driver development in Rust. Developed by Surface.
irsl/curlshell
reverse shell using curl
XaFF-XaFF/Black-Angel-Rootkit
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
trickest/cve
Gather and update all available and newest CVEs with their PoC.
kindtime/nosferatu
Windows NTLM Authentication Backdoor
Developer-Y/cs-video-courses
List of Computer Science courses with video lectures.
donnemartin/system-design-primer
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
wecooperate/iMonitor
iMonitor(冰镜 - 终端行为分析系统)
Dump-GUY/Malware-analysis-and-Reverse-engineering
Some of my publicly available Malware analysis and Reverse engineering.
gtworek/Priv2Admin
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.