rkarabut's Stars
minimaxir/big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
0xAX/linux-insides
A little bit about a linux kernel
nothings/stb
stb single-file public domain libraries for C/C++
gophish/gophish
Open-Source Phishing Toolkit
shellphish/how2heap
A repository for learning various heap exploitation techniques.
RPISEC/MBE
Course materials for Modern Binary Exploitation by RPISEC
tanprathan/MobileApp-Pentest-Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
geohot/qira
QEMU Interactive Runtime Analyser
gdbinit/Gdbinit
Gdbinit for OS X, iOS and others - x86, x86_64 and ARM
kablaa/CTF-Workshop
Challenges for Binary Exploitation Workshop
cisco-sas/kitty
Fuzzing framework written in python
unix-thrust/beurk
BEURK Experimental Unix RootKit
booksbyus/scalable-c
Scalable C - The Book
johndekroon/serializekiller
Mass scanner for the Java serialize bug
kristinpaget/GuardBunny
Files for GuardBunny, an RFID shield presented at Shmoocon 2016
thomaxxl/group_info
Linux group_info refcounter overflow use afer free