Skip to content
View reg1reg1's full-sized avatar
💀
Python | Cyber Security | Threat Hunting | Cryptography
💀
Python | Cyber Security | Threat Hunting | Cryptography

Organizations

@osirislab

Block or report reg1reg1

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

🐶 A curated list of Web Security materials and resources.

13,105 1,754 Updated May 2, 2025

Personal Notes About Everything.

548 278 Updated May 6, 2021

📚 List of awesome university courses for learning Computer Science!

66,592 8,338 Updated May 4, 2023

A curated list of awesome infosec courses and training resources.

5,585 743 Updated Nov 21, 2025

List of All awesome Computer Science Courses

189 48 Updated Feb 14, 2023

Win32 and Kernel abusing techniques for pentesters

C++ 974 137 Updated Sep 3, 2023

A pentest reporting tool written in Python. Free yourself from Microsoft Word.

Python 1,461 253 Updated Mar 27, 2025

A curated list of awesome embedded and IoT security resources.

2,230 275 Updated Oct 17, 2023

A collection of various awesome lists for hackers, pentesters and security researchers

107,109 10,025 Updated Jan 18, 2025

A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mode for stress testing

Python 1,069 186 Updated Jan 15, 2021

Find, verify, and analyze leaked credentials

Go 24,645 2,229 Updated Feb 20, 2026

edb is a cross-platform AArch32/x86/x86-64 debugger.

C++ 2,899 340 Updated Dec 11, 2025

Tutorials for getting started with Pwntools

Jupyter Notebook 1,546 260 Updated Oct 1, 2024

My personal cheat sheet for using WinDbg for kernel debugging

JavaScript 453 68 Updated Apr 17, 2025

Resources to learn about Linux, containers, k8s, and related security stuff

40 9 Updated May 26, 2021

Google's differential privacy libraries.

Go 3,290 412 Updated Feb 18, 2026

An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.

C++ 47,775 2,678 Updated Feb 21, 2026

Collection of resources about Virtualization

1,938 306 Updated Jul 16, 2025

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python 10,120 1,193 Updated Feb 22, 2026

A list of resources for those interested in getting started in bug bounties

11,832 2,032 Updated Jul 23, 2024

Study Guide for the CEH v10

439 255 Updated Jan 1, 2021

Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.

Python 336,163 54,533 Updated Nov 3, 2025

The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

Python 47,601 2,163 Updated Apr 18, 2024

Notes for Beginner Network Pentesting Course

6,205 1,692 Updated Sep 21, 2022

The FRRouting Protocol Suite

C 4,022 1,457 Updated Feb 20, 2026
Next