Stuff to read up
☆252Aug 14, 2020Updated 5 years ago
Alternatives and similar repositories for reading-material
Users that are interested in reading-material are comparing it to the libraries listed below
Sorting:
- Tools of the trade☆85Sep 6, 2022Updated 3 years ago
- Writeups for different CTF challenges☆70Mar 25, 2025Updated 11 months ago
- Good to know, easy to forget information about binaries and their exploitation!☆66Sep 23, 2017Updated 8 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- Security Tool to detect arp poisoning attacks☆54Apr 15, 2018Updated 7 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Mar 22, 2015Updated 10 years ago
- Hassle free .gitignore manager☆35Jul 14, 2019Updated 6 years ago
- An experimental OS developed to learn about the internal concepts☆15May 29, 2017Updated 8 years ago
- An offline IDE for C++, although similar to ideone.com, but ensures that your code doesn't fall into wrong hands :p☆16Feb 18, 2016Updated 10 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆167May 10, 2018Updated 7 years ago
- Stream music over a network port.☆35Oct 30, 2017Updated 8 years ago
- Presence application built during Microsoft's Code.Fun.Do 2k18☆25Oct 30, 2018Updated 7 years ago
- My old portfolio, my previous small personal slice of the Internet☆11Jul 3, 2021Updated 4 years ago
- ☆25Jan 6, 2016Updated 10 years ago
- FBTools allows you to access Facebook via command-line.It provides some features that are not available via Facebook Graph API.☆46Jul 8, 2017Updated 8 years ago
- GSoC proposal for GNU Radio☆10Mar 27, 2018Updated 7 years ago
- network security scripts and tips....☆14Oct 23, 2018Updated 7 years ago
- Generate "truly" random numbers (WARNING: NOT RANDOM!!! The "truly" is in sarcasquotes)☆87May 10, 2016Updated 9 years ago
- An awesome resource listing and explaining various commonly used *nix commands☆157Feb 23, 2018Updated 8 years ago
- ☆13Dec 4, 2015Updated 10 years ago
- ☆22May 5, 2020Updated 5 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,281Oct 7, 2022Updated 3 years ago
- An addictive, multiplayer game in which one has to control a curve☆21Mar 29, 2017Updated 8 years ago
- Cracking real-world Crypto, the fun way☆20Dec 7, 2016Updated 9 years ago
- A command line app to compare users on different platforms.☆12May 21, 2017Updated 8 years ago
- Exploit web-vulnerabilities☆23Apr 9, 2019Updated 6 years ago
- Hide information content into busy areas of images, optimally☆63Mar 21, 2017Updated 8 years ago
- InfoSecIITR website☆11Nov 15, 2025Updated 3 months ago
- My solutions to the machine learning course by Andrew Ng on coursera☆10Oct 22, 2018Updated 7 years ago
- Slack webhook app to create anonymous public channels☆87Dec 11, 2022Updated 3 years ago
- Web Server to Display list of Counter Strike 1.6 servers within the Intranet☆31Oct 30, 2017Updated 8 years ago
- ☆19Jan 30, 2016Updated 10 years ago
- A collection of my implementations of commonly used Data Structures and Algorithms in programming competitions☆12Sep 5, 2017Updated 8 years ago
- ☆10Mar 31, 2023Updated 2 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Scrape GSoC organisations using a single script.☆127Feb 1, 2021Updated 5 years ago
- ☆18Aug 30, 2020Updated 5 years ago
- Beautify your Git Logs !☆309Mar 2, 2017Updated 9 years ago
- Simple single cycle RISC processor written in Verilog☆49Mar 23, 2018Updated 7 years ago