stypr / resume-templateLinks
Free Lightweight HTML resume template
☆19Updated 3 months ago
Alternatives and similar repositories for resume-template
Users that are interested in resume-template are comparing it to the libraries listed below
Sorting:
- Jar2Exe extraction tool☆15Updated 3 years ago
- Script for automating Linux memory capture and analysis☆13Updated 5 years ago
- Help deobfuscate VBScript☆18Updated 3 years ago
- ☆18Updated 5 years ago
- PoC BSOD for CVE-2020-16898 (badneighbor)☆21Updated 5 years ago
- SSD Challenges☆48Updated 3 years ago
- Google Chrome Use After Free☆61Updated 3 years ago
- ☆36Updated 6 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 7 months ago
- Prometheus-Decryptor is a project to decrypt files encrypted by Prometheus ransomware.☆53Updated 4 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆61Updated 5 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆78Updated 6 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Updated 4 years ago
- TightVNC Vulnerability.☆16Updated 4 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Updated 4 years ago
- qiling framework examples☆16Updated 4 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24Updated 7 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- How to create VMware vagrant box☆11Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- ☆19Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆53Updated 3 years ago
- ☆20Updated 6 years ago
- AMSI detection PoC☆31Updated 5 years ago