A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
-
Updated
Sep 2, 2022 - C
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
Signature scheme submitted to NIST's Post-Quantum Cryptography Project
Program examples utilizing the DPDK. The DPDK is a kernel-bypass network library that allows for very fast network packet processing. This is great for (D)DoS mitigation and low-latency packet inspection, manipulation, and forwarding.
IAV quantumSAR - "Quantum-proof your data with our state of the art cryptographic implementation"
A repository that includes common helper functions for writing applications in the DPDK. I will be using this for my future projects in the DPDK.
Signature scheme submitted to NIST's Post-Quantum Cryptography Project
Not the device we need, but the one we deserve
Understanding industrial Cybersecurity.
"ACCESS LIST" Bypass collections used during pentesting, gathered in one place. The list types include tools, usernames, passwords, combos, wordlists, Ai Jailbreaks, Dorks and many more.
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
🏴☠️ Tools for pen-testing, CTFs & wargames. 🏴☠️
ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
THAMARA - Threat Hunting with AMSI and YARA
C language based project from where we came to know how many users in the system, how much credit they have, how to keep track of information such as user id, full name, password, and credits (in clients.txt), how to add and remove a user. Admin and client window.
Our tool is able to gather dumps of all executable pages of packed processes.
Foi feito o estudo de um repositório simulando a vulnerabilidade de um buffer overlow, documentamos como conseguimos rodar o código e fizemos uma modificação no shellcode para executar outro comportamento (desligar a maquina virtual)
Add a description, image, and links to the cyber topic page so that developers can more easily learn about it.
To associate your repository with the cyber topic, visit your repo's landing page and select "manage topics."