akazemi67 / TeachingLinks
A place in which I put various resources from my classes, presentations, and videos.
☆44Updated last year
Alternatives and similar repositories for Teaching
Users that are interested in Teaching are comparing it to the libraries listed below
Sorting:
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Framework for generating audit commands for Unix security audits☆66Updated 2 years ago
- The most complete code auditing platform with thousands of real-world challenges☆125Updated last month
- Repository of tools and resources for analyzing Docker containers☆67Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 7 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆81Updated 2 months ago
- Yet another awesome fuzzers list☆14Updated 9 months ago
- Commands and Scripts to attack Linux and Servers☆33Updated 3 months ago
- ☆120Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆295Updated 2 years ago
- ☆66Updated 2 years ago
- ☆55Updated 10 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆63Updated 8 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆87Updated 4 months ago
- Malware that we analyzed on our site.☆22Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆24Updated 2 years ago
- Linux Security and Hardening Security Guide☆211Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆167Updated 10 months ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆23Updated 8 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- A curated list of awesome malware analysis tools and resources☆96Updated 3 years ago
- PowerShell Script Analyzer☆70Updated last year