Skip to content
View hyp3r5pace's full-sized avatar
💭
learning...
💭
learning...

Block or report hyp3r5pace

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

security resources

25 repositories

🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks

Java 932 142 Updated Jan 15, 2022

Recent Fuzzing Paper

349 119 Updated Sep 15, 2020
C 184 30 Updated Jun 14, 2022

This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.

C 59 8 Updated Feb 8, 2022

信息安全方面的书籍

2,334 925 Updated Apr 25, 2024

Reverse engineering focusing on x64 Windows.

C++ 5,166 498 Updated Aug 1, 2024

Reverse Engineering Resources

HTML 226 45 Updated Jun 19, 2018

Repository for information about 0-days exploited in-the-wild.

HTML 755 74 Updated Aug 22, 2024

Perfect Blue's CTF Writeups

Max 663 50 Updated Jun 24, 2024

An step by step fuzzing tutorial. A GitHub Security Lab initiative

2,454 321 Updated Jun 3, 2024

Collection of resources I have used throughout my studies (cybersecurity and systems)

205 27 Updated Jan 7, 2024
Python 2,562 405 Updated Jul 11, 2024

A collection of smart contract vulnerabilities along with prevention methods

1,880 257 Updated Jul 28, 2024

A curated list of awesome Fuzzing(or Fuzz Testing) for software security

826 84 Updated Nov 20, 2023

A list of helpful cybersecurity / infosec resources

1,215 99 Updated Jun 14, 2024

CTF challenges I created

Python 37 2 Updated Jun 11, 2021

Challenges I created for CTF competitions.

Python 182 8 Updated Oct 1, 2024

Zoom Cryptography Whitepaper

547 36 Updated Jun 17, 2024

Basic implementations of standard cryptography algorithms, like AES and SHA-1.

C 1,799 686 Updated Dec 28, 2020

📓 Some security related notes

458 41 Updated Aug 13, 2017

A curated list of blockchain security Capture the Flag (CTF) competitions

1,492 235 Updated Mar 11, 2024

Comprehensive list of known attack vectors and common anti-patterns

1,403 209 Updated Sep 23, 2022

Guidelines and training material to write secure smart contracts

Solidity 2,209 345 Updated Sep 30, 2024

A quick reference for EVM opcodes

771 104 Updated Aug 12, 2024