akib1162100 / mac
☆63Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for mac
- Learn C Programming, Second Edition, published by Packt☆65Updated 5 months ago
- A roadmap to learn C from Scratch☆488Updated last month
- ☆136Updated 9 months ago
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆28Updated last year
- This repo contains my writeups and code from YouTube videos☆31Updated last month
- EthicalHacking, Python, Nmap, Metasploit☆63Updated 4 years ago
- The Black Hat Bash book repository☆191Updated 2 weeks ago
- library documents for development☆162Updated 7 years ago
- Linux Kernel Programming 2E - published by Packt☆259Updated last week
- notes and ramblings from my OSCP/PenTesting Studies☆67Updated last year
- Projects for security students and professionals☆137Updated 4 months ago
- Collection of Linux Books☆19Updated 7 years ago
- Programming in assembly language tutorial☆646Updated 2 months ago
- Advanced memory management features of C and C++; the differences between imperative and object-oriented paradigms. The functional paradi…☆29Updated 5 months ago
- Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great…☆120Updated 10 months ago
- A complete E Book collection for Hackers and Security Researchers.☆88Updated 3 weeks ago
- Book in Progress☆57Updated this week
- "Programmers are not to be measured by their ingenuity and their logic but by the completeness of their case analysis." ― Alan J. Perlis☆68Updated 2 years ago
- Python for Security and Networking, Published by Packt☆65Updated last year
- Hacking Books☆545Updated 4 years ago
- Knowledge needed to obtain the OSCP certification☆239Updated 4 months ago
- Source Code for 'Beginning x64 Assembly Programming' by Jo Van Hoey☆179Updated 2 years ago
- Computer Architecture with Python and ARM, published by Packt.☆18Updated 11 months ago
- "To competently perform rectifying security service, two critical incident response elements are necessary: information and organization.…☆48Updated 3 years ago
- ☆113Updated 7 years ago
- Example code from O'Reilly's bash Idioms☆73Updated last year
- Basic books for better knowing of Linux and shells☆51Updated 5 years ago
- Linux kernel map☆941Updated 2 weeks ago
- Learn C Programming, published by Packt☆252Updated last year