akazemi67 / TeachingLinks
A place in which I put various resources from my classes, presentations, and videos.
☆45Updated last year
Alternatives and similar repositories for Teaching
Users that are interested in Teaching are comparing it to the libraries listed below
Sorting:
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- Framework for generating audit commands for Unix security audits☆66Updated 2 years ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆81Updated 3 months ago
- The most complete code auditing platform with thousands of real-world challenges☆127Updated 2 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆70Updated 8 months ago
- A not-curated list of cloud hacking labs☆25Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆63Updated 9 months ago
- Linux Security and Hardening Security Guide☆211Updated last year
- ☆119Updated 2 years ago
- ☆37Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- A list of awesome penetration testing tools and resources.☆80Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆29Updated 5 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 11 months ago
- Yet another awesome fuzzers list☆14Updated 10 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 11 months ago
- A Repository to Track Anti-Forensic Techniques☆111Updated 2 years ago
- ☆55Updated 10 months ago
- ☆64Updated 2 years ago
- ☆82Updated 9 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated 2 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated 2 weeks ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Open Source eBPF Malware Analysis Framework☆49Updated 10 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆92Updated 3 weeks ago