timofg's Stars
sunface/rust-course
“连续八年成为全世界最受喜爱的语言,无 GC 也无需手动内存管理、极高的性能和安全性、过程/OO/函数式编程、优秀的包管理、JS 未来基石" — 工作之余的第二语言来试试 Rust 吧。本书拥有全面且深入的讲解、生动贴切的示例、德芙般丝滑的内容,这可能是目前最用心的 Rust 中文学习教程 / Book
fuzzdb-project/fuzzdb
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
tpn/pdfs
Technically-oriented PDF Collection (Papers, Specs, Decks, Manuals, etc)
xairy/linux-kernel-exploitation
A collection of links related to Linux kernel security and exploitation
onethawt/idaplugins-list
A list of IDA Plugins
klee/klee
KLEE Symbolic Execution Engine
Clouditera/SecGPT
SecGPT网络安全大模型
sodium-friends/learntocrypto
Learn to crypto workshop
illera88/Ponce
IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
OpenRCE/sulley
A pure-python fully automated and unattended fuzzing framework.
rosehgal/BinExp
Linux Binary Exploitation
nixawk/labs
Vulnerability Labs for security analysis
nccgroup/featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
w3h/icsmaster
ICS/SCADA Security Resource(整合工控安全相关资源)
netzob/netzob
Netzob: Protocol Reverse Engineering, Modeling and Fuzzing
maddiestone/IDAPythonEmbeddedToolkit
IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices
airbus-seclab/cpu_rec
Recognize cpu instructions in an arbitrary binary file
joxeankoret/pigaios
A tool for matching and diffing source codes directly against binaries.
Cr4sh/openreil
Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)
trimstray/technical-whitepapers
Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
Boyan-MILANOV/ropium
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
1ultimat3/PcapViz
Visualize network topologies and collect graph statistics based on pcap files
joxeankoret/idamagicstrings
An IDA Python script to extract information from string constants.
CERTCC/trommel
TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators
Ga-ryo/IDAFuzzy
Fuzzy search tool for IDA Pro.
ixty/xarch_shellcode
Cross Architecture Shellcode in C
n30m1nd/Linux_Heap_Exploitation_Intro_Series
Various PoCs and challenges regarding heap userland exploitation
3gstudent/Winpcap_Install
Auto install WinPcap on Windows(command line)
shift-crops/House_of_Rabbit
Heap exploitation technique bypassing heap ASLR
gentoo-mirror/pentoo
The overlay contains new or updated security tools.