Aan's repositories
Exploit-Development-Tools
A bunch of my exploit development helper tools, collected in one place.
awesome-iocs
A collection of sources of indicators of compromise
assembly-intro
Intro to x86 Assembly Language.
awesome-lockpicking
:unlock::sunglasses: A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.
awesome-machine-learning-on-source-code
Interesting links & research papers related to Machine Learning applied to source code (MLonCode)
BinExp
Linux Binary Exploitation
bounty-targets-data
This repo contains hourly-updated data dumps of Hackerone/Bugcrowd scopes that are eligible for reports
charlesreid1-awesome
An awesome list for all the awesome stuff I do. 🕶️
Checklists
Pentesting checklists for various engagements
IoTSecurity101
From IoT Pentesting to IoT Security
java-deserialization-exploits
A collection of curated Java Deserialization Exploits
LaraEve
LaraEve(Laravel Everyday). Repository to track my laravel learning process and resources that i've used.
linux-exploitation-course
A Course on Intermediate Level Linux Exploitation
Linux_Heap_Exploitation_Intro_Series
Various PoCs and challenges regarding heap userland exploitation
lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
makin
makin - reveal anti-debugging and anti-VM tricks
ml_cheatsheet
A 5-pages only Machine Learning cheatsheet focusing on the most popular algorithms under the hood
nano
Nano is a family of PHP web shells which are code golfed for stealth.
Newbie-Security-List
网络安全学习资料,欢迎补充
pastebin-scraper
Pastebin-scraper tool leverages the API of https://psbdmp.ws/ to find emails/domains dumped in pastebin.
pegelinux
Blog aggregator for pegelinux community
pwning
RE / Binary Exploitation Resources
pyt
A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
REsources
Reverse Engineering Resources
ScriptDotSh-Reverse-Engineering
This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja
spring-security
Spring Security
tactical-exploitation
Modern tactical exploitation toolkit.
TensorFlow-Tutorials
TensorFlow Tutorials with YouTube Videos
tutorials
Materials for LIEF tutorials
VHostScan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.