Some guides about general topics on information security
☆13Mar 19, 2019Updated 6 years ago
Alternatives and similar repositories for Security-Studies
Users that are interested in Security-Studies are comparing it to the libraries listed below
Sorting:
- Writeup for the OverTheWire Advent Bonanza 2019 CTF (https://advent2019.overthewire.org/)☆14May 10, 2020Updated 5 years ago
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- Apk infector && Frida injector☆23Jul 25, 2024Updated last year
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- Infographiq, ie intelligent interactive infographics, core JavaScript library☆11Jan 17, 2024Updated 2 years ago
- Eltima Port Virtualization Technology may be integrated to the software or hardware solutions to get the remote access to network devices☆10Jun 6, 2018Updated 7 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆33Apr 12, 2023Updated 2 years ago
- Bootloader tool for OLS☆22Jul 17, 2016Updated 9 years ago
- All Write-up pushed by RasyidMF. This repository is created for private or public learning purposes☆10Oct 16, 2020Updated 5 years ago
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- An Android application that stores and shows you a gallery of images on a map based on the location where the picture was taken☆13Nov 12, 2017Updated 8 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- ☆10Apr 10, 2021Updated 4 years ago
- Using a proxy d3d11 dll and function hooking to inject triangle drawing code into Skyrim☆13Jul 12, 2021Updated 4 years ago
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- 📲 Selfhosted RSS Podcast Feeds for Youtube channels.☆12Mar 15, 2018Updated 7 years ago
- A extended camera node plugin to do animations between two camera positions with various easing curves.☆12Feb 1, 2022Updated 4 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- Simple data-oriented & multi-language starter with Eleventy, TailwindCSS & Fontsource☆11Mar 15, 2023Updated 2 years ago
- Slides, codes, and materials related to my courses☆15Dec 19, 2025Updated 2 months ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 2 months ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Latihan membuat aplikasi rest api☆11Dec 22, 2022Updated 3 years ago
- API resep masakan bahasa indonesia☆11Jan 22, 2021Updated 5 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- ☆11Oct 8, 2021Updated 4 years ago
- Bangkit 2021 Capstone Project☆12Sep 6, 2021Updated 4 years ago
- Plays Game of Thrones opening in your terminal every time you mistype `git`.☆13Jul 10, 2017Updated 8 years ago
- Nexxus Stock Keeping☆15Jul 16, 2023Updated 2 years ago
- ☆12May 6, 2019Updated 6 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆15Jan 18, 2022Updated 4 years ago