Stars
Organized list of my malware development resources
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
An evolving how-to guide for securing a Linux server.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Linux Kernel Programming, published by Packt
The perfect emulation setup to study and develop the Linux kernel v5.4.3, kernel modules, QEMU, gem5 and x86_64, ARMv7 and ARMv8 userland and baremetal assembly, ANSI C, C++ and POSIX. GDB step deb…
BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more
Template-Driven AV/EDR Evasion Framework
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Resources for Windows exploit development
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
Wiki to collect Red Team infrastructure hardening resources
An arXiv for, what I think, are the finest in hacker works
Scaffolding for BPF application development with libbpf and BPF CO-RE
A cross-platform, OpenGL terminal emulator.