tahmad08 / Computer-Organization-and-ProgrammingView external linksLinks
CS2110 at Georgia Tech
☆12Feb 26, 2019Updated 6 years ago
Alternatives and similar repositories for Computer-Organization-and-Programming
Users that are interested in Computer-Organization-and-Programming are comparing it to the libraries listed below
Sorting:
- A simple, reliable and reasonably fast network capture analyzer.☆24Feb 7, 2026Updated last week
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆27Nov 10, 2025Updated 3 months ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- generates unique subdomain names and runs httpx on them☆17Apr 8, 2024Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 9 months ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆50Jul 30, 2021Updated 4 years ago
- ☆13Oct 14, 2022Updated 3 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 2 years ago
- My public talks☆14Oct 1, 2024Updated last year
- PoC to tunnel via AWS Short-Message-Queues☆23Jun 21, 2025Updated 7 months ago
- Disassemble V8 Ignition bytecode.☆12Jan 2, 2024Updated 2 years ago
- windows/x86 brainfuck compiler☆15May 11, 2017Updated 8 years ago
- Slurps down the most popular plugins and themes from WordPress.org☆15May 21, 2025Updated 8 months ago
- Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnerability (CVE-2025-4275)☆39Jun 20, 2025Updated 7 months ago
- Collections of code obfuscation libaries for different languages ( in progress )☆15Mar 18, 2023Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- ISC2017安全大会☆16Nov 3, 2017Updated 8 years ago
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated last year
- Python decompiler. Written in JavaScript. Works in NodeJS. Decompiles extremely fast.☆19Dec 26, 2025Updated last month
- cheatsheets, dotfiles, scripts...☆18Dec 28, 2025Updated last month
- Exfiltrate data from a compromised target using covert channels☆17Mar 20, 2021Updated 4 years ago
- Various exploits for SerenityOS☆17Oct 29, 2021Updated 4 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆19Mar 8, 2024Updated last year
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Swiss army knife for directory comparison and synchronization☆49Dec 11, 2025Updated 2 months ago
- ☆26Aug 5, 2025Updated 6 months ago
- Zydis JavaScript bindings via WASM☆21Mar 28, 2023Updated 2 years ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆63Jan 13, 2026Updated last month
- A docker environment which could run and debug multiarch program, such as mips, arm☆18Nov 25, 2020Updated 5 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 3 years ago
- ☆18May 9, 2020Updated 5 years ago
- Solution for cryptohack challenges☆21Oct 6, 2021Updated 4 years ago