An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
-
Updated
Jan 5, 2024 - C
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
A fork of Spamhole by Dustin Trammell with added safety
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."