A list of resources I collected during my journey into cybersecurity
☆35Oct 9, 2021Updated 4 years ago
Alternatives and similar repositories for W3rni0-awesome-resources
Users that are interested in W3rni0-awesome-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This "Automotive Cybersecurity Career Roadmap" is tailored for individuals aspiring to build expertise in automotive cybersecurity.☆21Jan 3, 2025Updated last year
- Rust implementation of the EVM☆14Mar 19, 2023Updated 3 years ago
- Understanding some of the Anti-Reversing Techniques☆12Oct 6, 2019Updated 6 years ago
- Challenges of the alpha ctf 2022☆13Jan 4, 2024Updated 2 years ago
- ☆14Jun 9, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🪙 The Ore Programming Language☆13Dec 19, 2023Updated 2 years ago
- Simple programming language based on pvm written in C.☆11Aug 28, 2024Updated last year
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆16Mar 30, 2025Updated last year
- Generates all the possible words from a prefix given by the user!☆10May 2, 2024Updated 2 years ago
- Prototype risk modeling simulation for Portfolio using Arbiter.☆20Aug 4, 2023Updated 2 years ago
- ☆11Dec 2, 2023Updated 2 years ago
- ☆10Mar 8, 2023Updated 3 years ago
- ☆14Feb 23, 2025Updated last year
- Gets joke from icanhazdadjoke.com, prints it☆13Jan 5, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Solutions for DamnVulnerableDefi, a smart-contract based CTF Challenge☆12Dec 22, 2022Updated 3 years ago
- 🚩 framework for kernel memory exploitation (WIP)☆22Jul 22, 2025Updated 9 months ago
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Dec 12, 2023Updated 2 years ago
- ☆19Feb 10, 2024Updated 2 years ago
- nexos source files made by @samdem-ai☆20Oct 7, 2024Updated last year
- ☆17May 21, 2022Updated 4 years ago
- A solidity library for performing arithmetic.☆15Apr 19, 2019Updated 7 years ago
- Learn Cairo and StarkNet Smart Contract programming with example code☆23Nov 2, 2022Updated 3 years ago
- A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.☆15Sep 19, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- String Decryption for the .NET Obfuscator Eazfuscator☆16May 11, 2024Updated 2 years ago
- ☆16Jan 14, 2025Updated last year
- Gemini4IDA: Gemini for IDA disassembly and program analysis☆13Dec 29, 2023Updated 2 years ago
- Offensive Hacking Unfolded - Become a Pro Pentester, by Packt Publishing☆20Jan 18, 2023Updated 3 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆30Apr 18, 2026Updated last month
- Publications from Calif☆410May 11, 2026Updated last week
- Minecraft mod that allow you to add an unlimited amount of your music as music discs.☆10Sep 6, 2025Updated 8 months ago
- ☆24Dec 16, 2023Updated 2 years ago
- Experiment with simple CosmJS concepts☆21May 11, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A small WinRM client designed for interacting with JEA endpoints.☆18Aug 29, 2024Updated last year
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated 2 years ago
- If you want to update Digital Logic Sim, so you can download this, update and commit☆94Jan 28, 2026Updated 3 months ago
- This is a Sharp assembly loader in PowerShell☆15Oct 23, 2025Updated 6 months ago
- Solutions for five programming problems every Software Engineer should be able to solve in less than 1 hour☆39May 12, 2015Updated 11 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago