Lists (3)
Sort Name ascending (A-Z)
Stars
Learn Assembly Language basics: x86/x64 examples, low-level programming, performance optimization, and hardware interaction. Perfect for beginners and enthusiasts.
๐ Awesome lists about all kinds of interesting topics
This repo contains the dataset and code for the paper "SWE-Lancer: Can Frontier LLMs Earn $1 Million from Real-World Freelance Software Engineering?"
The 2013 edition of the Source SDK
aw-junaid / awesome
Forked from sindresorhus/awesome๐ Awesome lists about all kinds of interesting topics
Secure Golang web app with best practices: authentication, authorization, input validation, CSRF protection, and secure headers. Example code for secure development.
Explore free, self-hostable network services & web apps: email, file sharing, CMS, and more. Includes setup guides and Docker support for easy deployment.
Secure PHP web apps with best practices: SQLi prevention, XSS protection, CSRF tokens, password hashing, and secure session management.
Explore Docker examples: containerize apps, multi-container setups with Docker Compose, CI/CD integration, and best practices for efficient deployment.
Curated collection of free programming books: Python, JavaScript, Go, Rust, and more. Learn coding, algorithms, and system design with open-source resources.
Explore embedded & IoT security: secure firmware, device hardening, encryption, and vulnerability analysis. Practical examples for secure IoT development.
Learn malware analysis techniques: reverse engineering, dynamic/static analysis, and sandboxing. Includes tools, scripts, and sample malware for hands-on practice.
Learn Assembly Language basics: x86/x64 examples, low-level programming, performance optimization, and hardware interaction. Perfect for beginners and enthusiasts.
Master web security: OWASP Top 10, XSS, SQLi, CSRF, and secure coding practices. Includes labs, tools, and examples for secure web development.
Explore Android security: secure app development, reverse engineering, vulnerability testing, and best practices for data protection and encryption.
Secure DevOps pipelines: CI/CD security, infrastructure as code (IaC) best practices, container security, and vulnerability scanning for robust deployments.
Learn fuzzing techniques for vulnerability discovery: AFL, libFuzzer, and custom fuzzers. Includes examples, tools, and tips for effective software testing.
Explore password cracking techniques: brute force, dictionary attacks, and rainbow tables. Includes tools, scripts, and ethical guidelines for security testing.
Explore ML for security: anomaly detection, malware classification, and threat prediction. Includes datasets, models, and tools for AI-driven cybersecurity solutions.
Explore ethical hacking and security: penetration testing, vulnerability scanning, and exploit development. Includes tools, scripts, and hands-on labs.
Python projects for all levels: web scraping, data analysis, automation, and machine learning. Includes examples, libraries, and best practices.
Explore eBPF for security: real-time monitoring, intrusion detection, and kernel-level tracing. Includes examples, tools, and use cases for advanced threat analysis.
Master C++ (or C) programming: data structures, algorithms, system design, and performance optimization. Includes examples and best practices for all levels.
Learn and implement algorithms: sorting, searching, graph theory, and dynamic programming. Includes code examples, explanations, and performance analysis.
Explore neuroscience concepts: brain modeling, neural networks, and cognitive simulations. Includes datasets, tools, and research examples for computational neuroscience.
Master data visualization: interactive charts, dashboards, and storytelling with tools like Matplotlib, D3.js, and Tableau. Includes examples and datasets.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.