Cheatsheet for technical interviews
☆22Apr 10, 2018Updated 7 years ago
Alternatives and similar repositories for interview-prep
Users that are interested in interview-prep are comparing it to the libraries listed below
Sorting:
- Ans to the FAQ: How do you self-learn information security?☆29Mar 12, 2018Updated 7 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆19Oct 16, 2024Updated last year
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- Presenters, titles & links☆10Apr 13, 2015Updated 10 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/timing-attestation☆13Jun 29, 2015Updated 10 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- My masters degree dissertation for ISG, Royal Holloway (2011) on evolutionary fuzzing☆11Jul 22, 2016Updated 9 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- X-CTF 2016 Qualifiers Challenges Source☆12May 24, 2016Updated 9 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Repository to store the Threat Reports made by the McAfee Enterprise ATR Team☆10Oct 11, 2018Updated 7 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- ☆11Jul 25, 2020Updated 5 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- A data visualization project to show the taxi availability in Singapore☆12Jan 30, 2017Updated 9 years ago
- telegram bot for sg carpark rates☆10Aug 14, 2017Updated 8 years ago
- Comparison table of VMX capabilities for a bunch of processors☆13Nov 3, 2020Updated 5 years ago
- Library for parsing Embedded OpenType files (Microsoft embedded font "standard"), and converting them to other formats☆15Jul 14, 2025Updated 7 months ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- ☆12Aug 4, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- A dynamic data race detector for programs☆15Jan 2, 2016Updated 10 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 7 years ago