tuantvk
"To succeed, planning alone is insufficient. One must improvise as well." Isaac Asimov, Foundation
Vietnam
tuantvk's Stars
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
WerWolv/ImHex
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
MobSF/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
vasanthk/how-web-works
What happens behind the scenes when we type www.google.com in a browser?
rizinorg/cutter
Free and Open Source Reverse Engineering Platform powered by rizin
blaCCkHatHacEEkr/PENTESTING-BIBLE
articles
ytisf/theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
mytechnotalent/Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
ReactNativeNews/React-Native-Apps
Curated List of Open Source React Native Apps. Curation curtesy of
mrousavy/react-native-mmkv
⚡️ The fastest key/value storage for React Native. ~30x faster than AsyncStorage!
mobile-dev-inc/maestro
Painless Mobile UI Automation
linkedin/qark
Tool to look for several security related Android application vulnerabilities
alexandreborges/malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
guyinatuxedo/nightmare
RickdeJager/stegseek
:zap: Worlds fastest steghide cracker, chewing through millions of passwords per second :zap:
alexbieber/Bug_Bounty_writeups
BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔
kablaa/CTF-Workshop
Challenges for Binary Exploitation Workshop
shenril/Sitadel
Web Application Security Scanner
ITAYC0HEN/A-journey-into-Radare2
A series of tutorials about radare2 framework from https://www.megabeets.net
LordNoteworthy/windows-internals
My notes while studying Windows internals
januslo/react-native-bluetooth-escpos-printer
React-Native plugin for the bluetooth ESC/POS & TSC printers.
wtsxDev/Exploit-Development
Resources for learning about Exploit Development
ifding/radare2-tutorial
Reverse Engineering using Radare2
dobin/yookiterm-slides
Exploitation and Mitigation Slides
0xRick/0xRick.github.io
Infosec blog
ridvanaltun/react-native-deepar
Snapchat-like filters, AR lenses, and real-time facial animations.
datajerk/ctf-write-ups
My write-ups from various CTFs
cocomelonc/cocomelonc.github.io
Cybersecurity blog. Red Team, pentest, malware analysis and dev
Jean-Francois-C/Boot2root-CTFs-Writeups
Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges
vshaliii/DC-3-Vulnhub-Walkthrough
DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. As with the previous DC releases, this one is designed with beginners in mind, although this time around, there is only one flag, one entry point and no clues at all.