Stars
Unicode routines (UTF8, UTF16, UTF32) and Base64: billions of characters per second using SSE2, AVX2, NEON, AVX-512, RISC-V Vector Extension, LoongArch64, POWER. Part of Node.js, WebKit/Safari, Lad…
a Ghidra framework for iOS kernelcache reverse engineering
Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
Notes and captures for patching TLS in Wireshark (mirror of https://git.lekensteyn.nl/peter/wireshark-notes/)
A tool for checking the security hardening options of the Linux kernel
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Python port of ShadowsocksR
Collection of codes focused on Linux rootkits
🐙 Guides, papers, lessons, notebooks and resources for prompt engineering, context engineering, RAG, and AI Agents.
nsync is a C library that exports various synchronization primitives, such as mutexes
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.
Projects for an undergraduate OS course
Various tips & tricks
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separation; Enhances Misc Security Settings - https://www.kicksecure…
This project aims to compare and evaluate the telemetry of various EDR products.
JA4+ is a suite of network fingerprinting standards
ASCYLIB (with OPTIK) is a concurrent-search data-structure library with over 40 implementantions of linked lists, hash tables, skip lists, binary search trees, queues, and stacks.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…