kaltic's repositories
awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
afl-training
Exercises to learn how to fuzz with American Fuzzy Lop
AudioStego
Audio file steganography. Hides files or text inside audio files and retrieve them automatically
avatarify-desktop
Successor of Avatarify Python
avatarify-python
Avatars for Zoom, Skype and other video-conferencing apps.
avml
AVML - Acquire Volatile Memory for Linux
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
awesome-incident-response
A curated list of tools for incident response
awesome-security-GRC
Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).
Challenges_2020_public
Files + Writeups for DownUnderCTF 2020 Challenges
cheat.sh
the only cheat sheet you need
html5_attack_and_secure
HTML5 Training material for Attack and Secure training sessions.
ICS-Security-Products
Lists of products useful for ICS security
Internal-Pentest-Playbook
Internal Network Penetration Test Playbook
it-security-lecture
University lecture on "IT Security" as Open Educational Resources material
java_developer_training
Full 6-month Java developer training
katran
A high performance layer 4 load balancer
learngo
1000+ Hand-Crafted Go Examples, Exercises, and Quizzes
linux-insides
A little bit about a linux kernel
linux-kernel-exploitation
A collection of links related to Linux kernel security and exploitation
Malware
Course materials for Malware Analysis by RPISEC
MBE
Course materials for Modern Binary Exploitation by RPISEC
OpenUBA
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
OSEP-Pre
This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PENTESTING-BIBLE
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
shad0w
A post exploitation framework designed to operate covertly on heavily monitored environments
Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.