Stars
Using Low-rank adaptation to quickly fine-tune diffusion models.
Demystifying Exploitable Bugs in Smart Contracts
Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting
A complete computer science study plan to become a software engineer.
Impacket is a collection of Python classes for working with network protocols.
A curated list of engineering blogs of startup and enterprise companies
A collection of debugging stories. PRs welcome (sorry for the backlog) :-)
A collection of pentest and development tips
Security Research from the Microsoft Security Response Center (MSRC)
Official Black Hat Arsenal Security Tools Repository
Rip web accessible (distributed) version control systems: SVN/GIT/HG...
Security Guide for Developers (实用性开发人员安全须知)
越来越多的网站具有反爬虫特性,有的用图片隐藏关键数据,有的使用反人类的验证码,建立反反爬虫的代码仓库,通过与不同特性的网站做斗争(无恶意)提高技术。(欢迎提交难以采集的网站)(因工作原因,项目暂停)
Wiki to collect Red Team infrastructure hardening resources
Ansible is a radically simple IT automation platform that makes your applications and systems easier to deploy and maintain. Automate everything from code deployment to network configuration to clo…
A reviewed list of useful PHP static analysis tools
A book series on JavaScript. @YDKJS on twitter.
Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS 🎭
DataSploit / datasploit
Forked from dvopsway/datasploitAn #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
Manages application of security headers with many safe defaults
Free Security and Hacking eBooks
Linux kernel module for inspecting/modifying TCP socket state from user space
A list of public penetration test reports published by several consulting firms and academic security groups.