Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c cybersecurity
c
x
cybersecurity
x
37 search results found
Reverse Engineering
⭐
9,941
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Wazuh
⭐
8,176
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Suricata
⭐
3,738
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Adversary_emulation_library
⭐
1,419
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Hacking Windows
⭐
1,014
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Cronos
⭐
481
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Ctfs
⭐
379
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
Hiddenwall
⭐
378
Linux kernel module generator for Hidden firewall that follows the rules in the external YAML file.
Libptrace
⭐
171
An event driven multi-core process debugging, tracing, and manipulation framework.
Sentrypeer
⭐
142
Protect your SIP Servers from bad actors at https://sentrypeer.org
The_hive
⭐
137
My public notes about offensive security
Pasta1.0
⭐
129
PASTA: Portable Automotive Security Testbed with Adaptability
Apache Http Server Module Backdoor
⭐
108
👺 A Backdoor For Apache HTTP Server Written in C
Meow
⭐
86
Cybersecurity research results. Simple C/C++ and Python implementations
Embedded Hacking
⭐
74
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
Cs259d_notes_hw_cn
⭐
48
本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。
Process Hollowing Redteamops
⭐
46
Red Team Operation's Defense Evasion Technique.
Ics Hacking
⭐
39
This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
The Dpdk Examples
⭐
29
Program examples utilizing the DPDK. The DPDK is a kernel-bypass network library that allows for very fast network packet processing. This is great for (D)DoS mitigation and low-latency packet inspection, manipulation, and forwarding.
Tsuki Sploit
⭐
24
A USB-based script for Ethical hacking with multiple attacks
Wordlist Generator
⭐
24
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Trj
⭐
19
Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
The Dpdk Common
⭐
18
A repository that includes common helper functions for writing applications in the DPDK. I will be using this for my future projects in the DPDK.
Jerseyctf 2022 Challenges
⭐
17
JerseyCTF 2022
Itsmetraw
⭐
17
Ddos
⭐
17
Simple dos attack utility
Security_hacking_scripts
⭐
14
This Repository contains Encryption Algorithms, Ethical Hacking Scripts, Cybersecurity Learning Resources, and Security-Based Projects. Contribute to this repository as a part of Hacktoberfest Season
Ctfs
⭐
11
My CTF Writeups
Nist Bgp Srx
⭐
10
The NIST BGP Secure Routing Extension (BGP-SRx) is an open source reference implementation and research platform for investigating emerging BGP security extensions and supporting protocols such as RPKI Origin Validation and BGPsec Path Validation.
Ethical Hacking
⭐
9
Codes for malware, viruses and key-logger and other tools
Neuropil
⭐
9
(this is a gitlab mirror of) neuropil cybersecurity mesh
Computerscience
⭐
9
CS.CODE.IN is a 1 year online Computer Science education program to equip yourself with modern and cutting edge programming technologies in the competitive world.
Prodromos
⭐
8
Prodromos public repository
Reversesh3ll_as_r00tkit
⭐
7
An example kernel module rootkit to get reverse shell
Research
⭐
7
Please, see README.md for further information.
Intel
⭐
7
public malware intelligence
Shellshock
⭐
6
Picoctf 2017 Write Up
⭐
6
picoCTF is CMU (Carnegie Mellon University) CYBERSECURITY COMPETITION. picoCTF is where you reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. This repo contains solutions to the 2017 problems.
Woody_woodpacker
⭐
5
ELF binary packer - PIE compatible
Uaficionado
⭐
5
Red Team vs Blue Team. Series of 5 challanges. Are you up for it?
Related Searches
C Kernel (12,842)
C Video Game (4,242)
C Driver (4,106)
Python C (4,069)
C Firmware (3,545)
C Arduino (3,118)
C Arm (2,656)
C Usb (2,589)
C Command Line (2,475)
C Algorithms (2,333)
1-37 of 37 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.