akazemi67 / Teaching
A place in which I put various resources from my classes, presentations, and videos.
☆32Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for Teaching
- Framework for generating audit commands for Unix security audits☆66Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- Malware that we analyzed on our site.☆15Updated 6 months ago
- Awesome list of Search Engines for Cybersecurity Researchers☆77Updated last month
- A curated list of awesome malware analysis tools and resources☆40Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆87Updated last year
- Web Penetration Testing Course Materials☆33Updated 6 months ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆44Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆19Updated 3 months ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆67Updated last year
- Volatility MindMap & Cheat Sheet☆29Updated 2 years ago
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serve…☆64Updated this week
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆26Updated last month
- ☆26Updated 2 months ago
- ☆115Updated last year
- A not-curated list of cloud hacking labs☆19Updated 6 months ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆36Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆21Updated 4 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆39Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆55Updated last month
- Documentation and guidance to practice secure coding for various PLC vendors☆34Updated last year
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆39Updated 2 months ago
- Purple Team Strategies, Published by Packt☆11Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Resources for Browser Security Research☆25Updated 2 years ago
- ☆60Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆24Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆59Updated 7 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆46Updated this week
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated 9 months ago