AdityaBhatt3010 / Mastering-Assembly-for-Cybersecurity-From-Bytes-to-ExploitsLinks
An in-depth guide to understanding and writing efficient assembly code for cybersecurity, exploit development, and low-level programming.
☆13Updated 9 months ago
Alternatives and similar repositories for Mastering-Assembly-for-Cybersecurity-From-Bytes-to-Exploits
Users that are interested in Mastering-Assembly-for-Cybersecurity-From-Bytes-to-Exploits are comparing it to the libraries listed below
Sorting:
- Encryption Algorithm based on Bit Manipulation in Python3☆13Updated 2 years ago
- Deploy and orchestrate AWS RDS instances with ease, ensuring optimal performance and security along with BackUp options via Terraform.☆12Updated 9 months ago
- Wgel THM CTF Walkthrough☆12Updated last year
- A Java-based Hospital Management System implementing OOP concepts, AWT for GUI, multithreading, event handling, interfaces, abstract clas…☆13Updated 9 months ago
- VirusTotal API Key Leak Fix☆10Updated 9 months ago
- This API testing documentation demonstrates various test cases executed in Postman, covering authentication, data retrieval, order manage…☆10Updated 9 months ago
- ai app key leak fix☆10Updated 9 months ago
- AutoGPT-Next-Web-1 API Keys Fix☆10Updated 9 months ago
- All in one cryptography solution☆13Updated 6 months ago
- Personal Jarvis Ai using just Python Fixation☆11Updated last year
- SecureKeyGen: A robust cryptographic key generation tool leveraging hashing, PBKDF2, XOR, and multi-layered encryption for enhanced data …☆13Updated 10 months ago
- Tarang: An immersive music streaming platform with the main aim of promoting rising independent artists and community relationships.☆13Updated last year
- Deploy and orchestrate AWS EC2 instances with ease, ensuring optimal performance and security via Terraform.☆12Updated 9 months ago
- Web Forensics Documentation: A detailed guide covering methodologies, evidence collection, forensic processes, web protocols, and analysi…☆11Updated 9 months ago
- C++ project implementing a Doctor Management System with OOP, polymorphism, and templates.☆13Updated 9 months ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆12Updated 9 months ago
- Corrupt a File using Python 3☆13Updated 2 years ago
- Convert Image to Sketch with easily Python3☆13Updated 2 years ago
- Hydra Password Cracking Cheetsheet☆13Updated 5 years ago
- Lie Detector is a Prank software which pretends as if the software has an AI which knows the answer to any secret while the actual answer…☆14Updated 2 years ago
- Config files for my GitHub profile.☆22Updated this week
- This repository contains various scripts for the Digispark ATTiny85 USB Development Board. These scripts allow you to perform fun and use…☆11Updated 9 months ago
- A comprehensive, structured roadmap for aspiring penetration testers. Your path from zero to hired in 2025, covering all essential skills…☆22Updated 6 months ago
- ☆23Updated 3 months ago
- A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.☆614Updated 3 months ago
- notes☆152Updated 3 weeks ago
- List of the links to the docs for different services, which explain using of advanced search operators☆1,668Updated 9 months ago
- 100 days of cybersecurity - join Discord and connect with us to know more on this challenge #100daysofcybersecurity #sector21☆198Updated 8 months ago
- This repository contains a comprehensive collection of learning resources and notes that I've gathered on various topics, including cyber…☆306Updated last month
- Free Cybersecurity tutorials for beginners with 351 interactive lessons. Easy-to-follow programming guides with hands-on practice exercis…☆27Updated last month