Highlights
- Pro
Stars
Course materials for Modern Binary Exploitation by RPISEC
HACL*, a formally verified cryptographic library written in F*
Playing around "Less Slow" coding practices in C++ 20, C, CUDA, PTX, & Assembly, from numerics & SIMD to coroutines, ranges, exception handling, networking and user-space IO
Sioyek is a PDF viewer with a focus on textbooks and research papers
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
CS 771A: Introduction to Machine Learning, IIT Kanpur, 2022-23-autumn offering
Project work for Parallel Computing course in IITK
A command-line tool for logging into the IITK Fortinet firewall
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
GNU toolchain for RISC-V, including GCC
This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for anomaly detection.
Lightweight and customizable notification daemon
This repository contains materials from the author's operating system course at UC Berkeley lectured by Prof.Kubi, including coursework, assignments, code, and notes, among other materials
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
:squirrel: Optixal's Offensive Security Certified Professional (OSCP) / Penetration Testing with Kali Linux (PWK) Personal Notes 💻
A repository for learning various heap exploitation techniques.
🦀 Small exercises to get you used to reading and writing Rust code!
A collection of links related to Linux kernel security and exploitation
Agents of respective games implemented according to the Absurd Agents PS.
A collection of fascinating and bizarre Censys Search Queries