AdityaBhatt3010 / Mastering-Assembly-for-Cybersecurity-From-Bytes-to-ExploitsLinks
An in-depth guide to understanding and writing efficient assembly code for cybersecurity, exploit development, and low-level programming.
☆14Updated 10 months ago
Alternatives and similar repositories for Mastering-Assembly-for-Cybersecurity-From-Bytes-to-Exploits
Users that are interested in Mastering-Assembly-for-Cybersecurity-From-Bytes-to-Exploits are comparing it to the libraries listed below
Sorting:
- Deploy and orchestrate AWS RDS instances with ease, ensuring optimal performance and security along with BackUp options via Terraform.☆13Updated 11 months ago
- All in one cryptography solution☆14Updated 7 months ago
- Network, recon and offensive-security tool for Linux.☆12Updated 11 months ago
- Personal Jarvis Ai using just Python Fixation☆12Updated last year
- Web Forensics Documentation: A detailed guide covering methodologies, evidence collection, forensic processes, web protocols, and analysi…☆12Updated 10 months ago
- C++ project implementing a Doctor Management System with OOP, polymorphism, and templates.☆14Updated 11 months ago
- Tarang: An immersive music streaming platform with the main aim of promoting rising independent artists and community relationships.☆14Updated last year
- Deploy and orchestrate AWS EC2 instances with ease, ensuring optimal performance and security via Terraform.☆13Updated 10 months ago
- This repository contains a collection of Bash and PowerShell scripts for automating AWS services, including AWS CLI setup, S3, EC2, and D…