Lists (4)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Cuda
- Dockerfile
- F#
- Go
- Groovy
- HCL
- HTML
- Hack
- Handlebars
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- Makefile
- Markdown
- Max
- Nim
- OCaml
- OpenSCAD
- PHP
- Perl
- PowerShell
- Processing
- Python
- R
- Ruby
- Rust
- SMT
- Scala
- Shell
- SystemVerilog
- TeX
- TypeScript
- VBA
- Visual Basic
- Vue
- XSLT
- YARA
The FLARE team's open-source tool to identify capabilities in executable files.
Learn ML engineering for free in 4 months!
Learn Ansible, Second Edition, published by Packt
Full-Stack Web Development with Go, published by Packt
The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, and Information Security professionals with co…
Sandwich is a multi-platform, multi-language, open-source library that provides a simple unified API for developers to use (multiple) cryptographic libraries in their applications.
List of resources for learning about modeling, operating, and using Amazon DynamoDB
[Node, Python, Java] Repository of sample Custom Rules for AWS Config.
Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudFormation Templates, K8s configurations, and Terraform JSON plans…
An integrated shell for working with the AWS CLI.
Digital logic design tool and simulator
A complete study plan to become a Site Reliability Engineer.
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
A collection of (mostly) technical things every software developer should know about
Open source vulnerability DB and triage service.
Offensive Software Exploitation Course
A Collection of application ideas which can be used to improve your coding skills.
Beginners book on Python - start here if you don't know programming
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus …
Code for "Zero To Production In Rust", a book on API development using Rust.
Learn how to design systems at scale and prepare for system design interviews
MongoDB: The Definitive Guide 3rd Edition
Repository for example code from The Nature of Code book
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.