Stars
virtualization obfuscator inspired by juhajong/vm-obfuscator
Windows OS Internals Curriculum Resource Kit ACADEMIC
Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.
A collection of links related to Linux kernel security and exploitation
Convert MSVC Style Inline Assembly to GCC Style Inline Assembly
🐶 A curated list of Web Security materials and resources.
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository …
Porting Windows Dynamic Link Libraries to Linux
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A curated list of awesome Fuzzing(or Fuzz Testing) for software security
A list of interesting payloads, tips and tricks for bug bounty hunters.
LIEF - Library to Instrument Executable Formats
History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.