Rainier-Cyber / C-cheatsheetView external linksLinks
A MEMORY DUMP OF C PROGRAMMING, by Sean Eyre (@oni49) and Stephen Semmelroth (@stephensemmelroth / @diodepack) of Rainier Cyber (acquired by StrataCore). This document is intended to provide you a quick desk reference for C’s syntax and semantics. We included several example programs that will elaborate on each section in greater detail.
☆17Apr 5, 2021Updated 4 years ago
Alternatives and similar repositories for C-cheatsheet
Users that are interested in C-cheatsheet are comparing it to the libraries listed below
Sorting:
- The syllabus and other organizational aspects of the Advanced OS class.☆18Apr 25, 2025Updated 9 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Packet Analysis on Steroids☆12Oct 20, 2022Updated 3 years ago
- ☆13Aug 17, 2020Updated 5 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Recordization library☆11Updated this week
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆10Jul 24, 2020Updated 5 years ago
- ☆11Jun 11, 2024Updated last year
- This solution is designed for an Azure Runbook to assign users to two Entra ID (AzureAD) groups based on their MFA capability (capable / …☆16Oct 12, 2023Updated 2 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated last year
- ABANDONED - JSON to UML (or something like it)☆14Dec 6, 2016Updated 9 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 7 months ago
- ☆11Mar 5, 2017Updated 8 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- ☆21Aug 13, 2025Updated 6 months ago
- ☆12May 18, 2017Updated 8 years ago
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- A simple converter from numbers to Cisterian numerical system☆16Jan 12, 2022Updated 4 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"☆23May 15, 2021Updated 4 years ago
- Web-based IBM mainframe IDE.☆15May 5, 2015Updated 10 years ago
- Repository that will progressively hold tiny projects and code snippets.☆24Jun 13, 2025Updated 8 months ago
- ☕ Manage and create a WiFi Hotspot with PowerShell 📶☆17Dec 25, 2023Updated 2 years ago
- ☆15Mar 2, 2017Updated 8 years ago
- ☆14Jun 7, 2023Updated 2 years ago
- A guide for junior/mid-level developers to learn the most essential Java / Spring concepts.☆17Mar 8, 2021Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Oct 7, 2025Updated 4 months ago
- carcass is a Python package to generate python package scaffolding based on best practices☆17Jan 10, 2022Updated 4 years ago
- Open COBOL ESQL 4J is an open-source Embedded SQL pre-compiler and run-time libraries for opensource COBOL 4J and PostgreSQL☆21Feb 2, 2026Updated 2 weeks ago
- Powershell sandboxing utility☆19Feb 2, 2026Updated 2 weeks ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Dotbot managed dotfiles for a polyglot dev using WSL. Includes PowerShell stuff for Windows Installation☆16Aug 4, 2025Updated 6 months ago
- ☆17Jan 21, 2026Updated 3 weeks ago
- AppLocker Policy Generator☆25Aug 25, 2025Updated 5 months ago