Cheatsheet for technical interviews
☆22Apr 10, 2018Updated 7 years ago
Alternatives and similar repositories for interview-prep
Users that are interested in interview-prep are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- My masters degree dissertation for ISG, Royal Holloway (2011) on evolutionary fuzzing☆11Jul 22, 2016Updated 9 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Comparison table of VMX capabilities for a bunch of processors☆13Nov 3, 2020Updated 5 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Presenters, titles & links☆10Apr 13, 2015Updated 10 years ago
- ☆11Jul 25, 2020Updated 5 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆18Oct 16, 2024Updated last year
- ☆13Jun 13, 2017Updated 8 years ago
- Repository to store the Threat Reports made by the McAfee Enterprise ATR Team☆10Oct 11, 2018Updated 7 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Mar 31, 2017Updated 8 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/timing-attestation☆13Jun 29, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆12Aug 4, 2015Updated 10 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- A dynamic data race detector for programs☆15Jan 2, 2016Updated 10 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago