Lists (3)
Sort Name ascending (A-Z)
Stars
A Collection of Code from Vari 10000 ous MarkWattTech Videos
Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included
ESP32DIV is a dual-purpose wireless testing toolkit powered by an ESP32
Replacement for a Milight/LimitlessLED hub hosted on an ESP8266
A Python based open source viewer for the NE3 Earpick wireless endoscope
My notes while studying for the PNPT from TCM Security.
OSCP Cheatsheet 2024-2025
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as g…
Guidance for mitigation web shells. #nsacyber
Ghidra is a software reverse engineering (SRE) framework
SkillTree client libraries facilitating the rapid integration of a gamified tool training approach in conjunction with skills-service. Provides out of the box support for Angular, React, Vue.js, an…
SkillTree is a micro-learning gamification platform supporting the rapid integration of a gamified tool training approach into new and existing applications.
A repository full of malware samples.
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
An open source desk widget using affordable TFT displays and an ESP32 (:
A comprehensive TryHackMe learning path with organized sections on Introductory Rooms, Linux Fundamentals, Networking, Forensics, CTF challenges, Scripting, and more. This repo provides a structure…
A list of typical positions in a startup and their policies for IAM AWS.
Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
Course files for CompTIA Linux+ XK0-004 and XK0-005.
Notes and slides for my 2024 Objective by the Sea talk on iOS decompilation
List of awesome reverse engineering resources
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Tools & Resources for Cyber Security Operations
This is a kernel module invoked reverse shell proof of concept.