Iordanis Petkakis's starred repositories
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Probabilistic-Programming-and-Bayesian-Methods-for-Hackers
aka "Bayesian Methods for Hackers": An introduction to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view. All in pure Python ;)
awesome-web-security
🐶 A curated list of Web Security materials and resources.
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Z0FCourse_ReverseEngineering
Reverse engineering focusing on x64 Windows.
Awesome-Bugbounty-Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
WebHackersWeapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
sha256-animation
Animation of the SHA-256 hash function in your terminal.
pentest-tools
A collection of custom security tools for quick needs.
IoTSecurity101
A Curated list of IoT Security Resources
FuzzingPaper
Recent Fuzzing Paper
Free_CyberSecurity_Professional_Development_Resources
An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19 for cybersecurity professionals with downtime can take advantage of to improve their skills and marketability to come out on the other side ready to rock. Now its taken on a life of its own and will persist, COVID be damned.
awesome-virtualization
Collection of resources about Virtualization
WindowsExploitationResources
Resources for Windows exploit development
breaking-and-pwning-apps-and-servers-aws-azure-training
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
Pentest-Notes
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
MalwareAnalysis-in-PDF
Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code on the computer system for user exploitation.
Beat-the-Machine
Reverse engineering basics in puzzle form
Exploit-Dev-OSCE
Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding
basicwindowskernelprogramming
Basic Windows Kernel Programming
Malware_Weaponization
A curated list of tools and techniques written from experience in weaponization of malware
x86_64_workshop
Container and files for a beginners workshop on writing Linux x86_64