Starred repositories
Find, verify, and analyze leaked credentials
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
Every practical and proposed defense against prompt injection.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Machine Learning Engineering Open Book
[being rewritten] Cross-platform iMessage POC
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
Post Processor for Facebook Static Analysis Tools.
Rust implementation of the Messaging Layer Security (MLS) protocol
Source code for Twitter's Recommendation Algorithm
A curated list of Generative AI tools, works, models, and references
✨ Innovative and open-source visualization application that transforms various data formats, such as JSON, YAML, XML, CSV and more, into interactive graphs.
A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
Every Security Engineer Interview Question From Glassdoor.com
Verified implementations for the Noise family of protocols
🎨 Diagram as Code for prototyping cloud system architectures
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
A simple framework for mobile system design interviews
A curated list of awesome privilege escalation
A curated list of Site Reliability and Production Engineering resources.
The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course