SATO Yusuke's starred repositories

coding-interview-university

A complete computer science study plan to become a software engineer.

system-design-primer

Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.

Language:PythonLicense:NOASSERTIONStargazers:265389Issues:6614Issues:293

big-list-of-naughty-strings

The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

Language:PythonLicense:MITStargazers:46048Issues:850Issues:96

masscan

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

Language:CLicense:AGPL-3.0Stargazers:23048Issues:653Issues:556

QRCoder

A pure C# Open Source QR Code implementation

awesome-oscp

A curated list of awesome OSCP resources

PowerShellTraps

Collection of PowerShell traps and oddities

Language:PowerShellLicense:Apache-2.0Stargazers:431Issues:37Issues:12

TSS.MSR

The TPM Software Stack from Microsoft Research

Language:CLicense:NOASSERTIONStargazers:424Issues:49Issues:126

ods

Open Data Structures の日本語ソースコード

Language:TeXLicense:NOASSERTIONStargazers:373Issues:18Issues:7

SecCon-Framework

Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuration into Productivity Devices and Privileged Access Workstations. This document will focus on Productivity Devices (SECCON 5, 4, and 3). Microsoft’s current guidance on Privileged Access Workstations can be found at http://aka.ms/cyberpaw and as part of the Securing Privileged Access roadmap found at http://aka.ms/privsec.

Kernel-exploit-tech

Linux Kernel exploitation Tutorial.

Language:CLicense:GPL-3.0Stargazers:256Issues:14Issues:0

CEHv10-Notes

:closed_book: Both personal and public notes for EC-Council's CEHv10 312-50, because it's thousands of pages/slides of boredom, and a braindump to many

napper-for-tpm

TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019

Language:PythonLicense:NOASSERTIONStargazers:95Issues:12Issues:8

PowerShellGallery-OneDrive

Repository for https://www.powershellgallery.com/packages/OneDrive

spring-graalvm-native-plugin

Supports for building Spring Boot applications as GraalVM native images.

Language:JavaLicense:MITStargazers:37Issues:5Issues:20