Stars
A collection of various awesome lists for hackers, pentesters and security researchers
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelistin…
UDP Hole Punching Proof implementations.
Zero-Day Code Injection and Persistence Technique
Exercises for learning Reverse Engineering and Exploitation.
A collection of resources for linux reverse engineering
📚 Freely available programming books
Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method
Magnificent app which corrects your previous console command.
Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.
Free sampling of files from the purported Equation Group hack.
The most cited deep learning papers
Leaked Mirai Source Code for Research/IoC Development Purposes