Highlights
- Pro
Starred repositories
TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structured intelligence. Using the DeepSeek LLM, it extracts MITRE AT…
A minimal GPU design in Verilog to learn how GPUs work from the ground up
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
The continuing development of the legendary VBA gameboy advance emulator.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems
Unlocks docker hub in Russia, Cuba, Iran, North Korea, Republic of Crimea, Sudan, and Syria
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…
CTF framework and exploit development library
Code samples to go along with the blog post on how to run code at load/unload time when using LD_PRELOAD to inject libraries.
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]
PEDA - Python Exploit Development Assistance for GDB
A collection of resources to learn Reverse Engineering from start!
Demo serverless applications, examples code snippets and resources for PHP
The essential toolkit for reversing, malware analysis, and cracking
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
Golang tool which helps dropping the irrelevant entries from your ffuf result file.
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
A script to detect if xz is vulnerable - CVE-2024-3094