AdityaBhatt3010 / Mastering-Assembly-for-Cybersecurity-From-Bytes-to-ExploitsLinks
An in-depth guide to understanding and writing efficient assembly code for cybersecurity, exploit development, and low-level programming.
☆13Updated 7 months ago
Alternatives and similar repositories for Mastering-Assembly-for-Cybersecurity-From-Bytes-to-Exploits
Users that are interested in Mastering-Assembly-for-Cybersecurity-From-Bytes-to-Exploits are comparing it to the libraries listed below
Sorting:
- Wgel THM CTF Walkthrough☆12Updated last year
- Encryption Algorithm based on Bit Manipulation in Python3☆13Updated 2 years ago
- C++ project implementing a Doctor Management System with OOP, polymorphism, and templates.☆13Updated 8 months ago
- A Java-based Hospital Management System implementing OOP concepts, AWT for GUI, multithreading, event handling, interfaces, abstract clas…☆13Updated 8 months ago
- Web Forensics Documentation: A detailed guide covering methodologies, evidence collection, forensic processes, web protocols, and analysi…☆11Updated 8 months ago
- All in one cryptography solution☆12Updated 4 months ago
- ai app key leak fix☆10Updated 8 months ago
- AutoGPT-Next-Web-1 API Keys Fix☆10Updated 8 months ago
- SecureKeyGen: A robust cryptographic key generation tool leveraging hashing, PBKDF2, XOR, and multi-layered encryption for enhanced data …☆12Updated 8 months ago
- Deploy and orchestrate AWS RDS instances with ease, ensuring optimal performance and security along with BackUp options via Terraform.☆11Updated 8 months ago
- VirusTotal API Key Leak Fix☆10Updated 8 months ago
- This API testing documentation demonstrates various test cases executed in Postman, covering authentication, data retrieval, order manage…☆10Updated 8 months ago
- Deploy and orchestrate AWS EC2 instances with ease, ensuring optimal performance and security via Terraform.☆11Updated 8 months ago
- Tarang: An immersive music streaming platform with the main aim of promoting rising independent artists and community relationships.☆12Updated last year
- Personal Jarvis Ai using just Python Fixation☆11Updated last year
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆12Updated 8 months ago
- Config files for my GitHub profile.☆20Updated this week
- Corrupt a File using Python 3☆13Updated 2 years ago
- Convert Image to Sketch with easily Python3☆13Updated 2 years ago
- Hydra Password Cracking Cheetsheet☆13Updated 5 years ago
- Lie Detector is a Prank software which pretends as if the software has an AI which knows the answer to any secret while the actual answer…☆13Updated 2 years ago
- This repository contains various scripts for the Digispark ATTiny85 USB Development Board. These scripts allow you to perform fun and use…☆11Updated 8 months ago
- Universal Offline AI Chatbot is a lightweight, extensible local assistant that answers questions based on your own PDFs — legal, technica…☆11Updated 3 months ago
- JSON2YAML is a Python-based utility that simplifies the process of converting CVE (Common Vulnerabilities and Exposures) data from JSON f…☆11Updated 8 months ago
- This Python application provides a graphical user interface (GUI) for downloading YouTube videos or audio using the YT-DLP library. Users…☆10Updated 8 months ago
- ☆10Updated last year
- ☆10Updated last year
- File Password Cracker is a versatile tool designed to help users crack password-protected files. The tool supports a wide range of file f…☆12Updated 8 months ago
- This Python application creates a chatbot interface using Streamlit, allowing users to interact with an AI model powered by the google.ge…☆10Updated 8 months ago
- ☆10Updated last year