CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's Perspective" & "The C Programming Language". Repository includes resources on C programming, incl. Stanford engineering lectures, GCC's C99, & bit-hacking.
☆43Jul 18, 2023Updated 2 years ago
Alternatives and similar repositories for c-systems-programming
Users that are interested in c-systems-programming are comparing it to the libraries listed below
Sorting:
- This repo covers Branch and Jump Tables in C and x86 assembly. Branch Tables handle jumps within a subroutine, while Jump Tables facilita…☆10Jul 18, 2023Updated 2 years ago
- (l)user friendly WinDBG theme.☆20Mar 16, 2019Updated 7 years ago
- List of Computer Science courses with video lectures.☆31Mar 9, 2026Updated last week
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- A collection of my notes from various topics☆14May 26, 2022Updated 3 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 8 months ago
- Advanced memory management features of C and C++; the differences between imperative and object-oriented paradigms. The functional paradi…☆41May 31, 2024Updated last year
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,451Oct 4, 2024Updated last year
- Programming course for Wannabes☆56Jan 26, 2025Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆68Aug 31, 2024Updated last year
- Windbg Readable & Dark Green Theme - Own Use☆46Apr 4, 2019Updated 6 years ago
- ☆69Jul 26, 2021Updated 4 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆85Nov 21, 2024Updated last year
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- Bypassing antivirus detection: old-school malware, new tricks☆67May 10, 2023Updated 2 years ago
- ☆29Feb 16, 2022Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- A list of application tools and information resources to help you effectively use regular expressions in OSINT (Open Source Intelligence)☆77Sep 7, 2023Updated 2 years ago
- ☆10Oct 9, 2024Updated last year
- ☆28Jun 18, 2019Updated 6 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆52Jun 13, 2021Updated 4 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Here I'm gonna collect links and resources, that I used for learning Assembly☆10Oct 11, 2016Updated 9 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 3 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- ☆17Sep 25, 2024Updated last year
- A side-scrolling beat 'em up game inspired by classic titles like Double Dragon. Players control one or two fighters battling through sta…☆34Sep 20, 2025Updated 6 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30May 24, 2020Updated 5 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆86Oct 18, 2024Updated last year
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago