Hey there, I am Gurkirat Singh (aka tbhaxor). This is my secret cave, where I will share my knowledge of computer science, mathematics, and physics.
The best practices, latest research and breaking news in social media, mobile, digital and collaboration platforms.
This is a simple place where you can download crackmes to improve your reverse engineering skills. If you want to submit a crackme or a solution to one of them, you must register. But before that, I strongly recommend you to read the FAQ. If you have any kind of question regarding the website, a crackme, feel free to join the discord chat.
Internet Search Engines For Security Researchers.
Kroll specialists regularly publish articles, blogs, studies and books that help our clients better understand the changing business landscape. Browse our featured items below, or search for all recent materials by service, industry or topic.
Deepen your security knowledge and gain a fundamental understanding of a variety of cybersecurity, identity, and compliance topics and best practices.
Commands, Payloads and Resources for the OffSec Certified Professional Certification (OSCP).
A tutorial website, we share Microsoft Windows Server, Linux Server, Firewalls, Cloud, Virtualization, and Networking related tutorials.
Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.
Learn more about the latest trends in fuzzing and software security testing in the new Code Intelligence blog.
The world's most comprehensive student-run cybersecurity event. It serves as an engaging platform for experiential learning and aims to inspire students to pursue education and careers in the field of cybersecurity.
Challenges for Binary Exploitation Workshop.
We Cover All Information Security Conferences / Niches. We’re the original Cybersecurity Conferences directory. Our directory is updated and checked manually to prevent spam and ensure that we remain the community’s preferred resource information for Cybersecurity Conferences, Events, Meetings, and Seminars throughout 2024, 2025, and onwards!
The EMBER dataset is a collection of features from PE files that serve as a benchmark dataset for researchers. The EMBER2017 dataset contained features from 1.1 million PE files scanned in or before 2017 and the EMBER2018 dataset contains features from 1 million PE files scanned in or before 2018. This repository makes it easy to reproducibly train the benchmark models, extend the provided feature set, or classify new PE files with the benchmark models.
Internet, Networking, Security News from Lifewire.
World First Visual AI Based Malware Detection. The first solution that converts files into graphical representations and checks whether malware is contained or not. We provide user-friendly, efficient and secure malware detection technology.
The most reliable website for privacy tools since 2015. Software, services, apps and privacy guides to fight surveillance with encryption for better internet privacy.
Get the latest insights and analysis on global email threats, plus tips and tools from our experts on how to protect your business from attacks.
A curated list of GPT agents for cybersecurity.
A searchable directory of TLS ciphersuites.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.
A curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
How hackers start their afternoon. HackerNoon is a free platform with 25k+ contributing writers. 100M+ humans have visited HackerNoon to learn about technology.
Cybersecurity is dynamic and ever-changing. Stay up-to-date with the latest threats, vulnerabilities and news on the Huntress blog.
This calculator returns a variety of information regarding Internet Protocol version 4 (IPv4) and IPv6 subnets including possible network addresses, usable host ranges, subnet mask, and IP class, among others.
Use tables, charts and maps generated from real-time data to discover where you are most likely to find cybercriminal activity and identify which countries and organisations are most and least proactive in their response to cybercrime.
Explore thought leadership, industry insights, and other resources related to cybercrime detection, disruption, and takedowns.
I have gathered these notes from lots of sources on the internet, such as OSCP guides, enumeration guides and books. If you see any content that you wrote and I haven't credited you, please let me know and I will add it.
Null Byte is a white hat hacker world for anyone interested in hacking, science, networking, social engineering, security, pen-testing, getting root, zero days, etc.
See the top MITRE ATT&CK® techniques we observed in confirmed cyber threats across the Red Canary customer base in 2022.