• Stars
    star
    472
  • Rank 93,034 (Top 2 %)
  • Language
  • License
    MIT License
  • Created almost 6 years ago
  • Updated almost 5 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.

technical whitepapers

For hackers, pentesters, system administrators, programmers, security researchers...

  • base - only english version (90 books, ~223MB)
  • pl - only polish version (62 books, ~112MB)

Clamav report

----------- SCAN SUMMARY -----------
Known viruses: 6784116
Engine version: 0.100.2
Scanned directories: 201
Scanned files: 508
Infected files: 0
Data scanned: 1240.22 MB
Data read: 605.43 MB (ratio 2.05:1)
Time: 176.584 sec (2 m 56 s)

base directory

  • BPF: Tracing and More (Brendan Gregg, 2017)
  • Container Performance Analysis (Brendan Gregg)
  • From DTrace To Linux (Brendan Gregg, 2014)
  • Linux 4.x Performance Using BPF Superpowers (Brendan Gregg, 2016)
  • Linux Instrumentation (Ian Munsie, 2010)
  • Linux Performance Tools (Brendan Gregg, 2014)
  • Linux Performance Analysis New Tools and Old Secrets (Brendan Gregg)
  • Linux Profiling at Netflix (Brendan Gregg, 2015)
  • Linux Systems Performance (Brendan Gregg, 2016)
  • Open Source Systems Performance (Brendan Gregg, 2013)
  • Performance Analysis: The USE Method (Brendan Gregg, 2012)
  • Performance Checklists for SREs (Brendan Gregg, 2016)
  • Performance Methodologies for Production Systems (Brendan Gregg, 2013)
  • System Performance (Brendan Gregg, 2013)
  • Linux Performance Tools (Brendan Gregg, 2015)
  • Performance Analysis Superpowers with Linux eBPF (Brendan Gregg, 2015)
  • xv6: a simple, Unix-like teaching operating system (Russ Cox, Frans Kaashoek, Robert Morris, 2012)
  • Writing a Simple Operating System — from Scratch (Nick Blundell, 2010)
  • Windows NT Alerts Design Note (David N. Cutler, 1989)
  • Windows A Software Engineering Odyssey (Mark Lucovsky)
  • Disk Subsystem Performance Analysis for Windows (2014)
  • Windows Error Codes (2015)
  • Kernel Debugging with WinDbg (2005)
  • Windows Kernel Internals Traps, Interrupts, Exceptions (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Advance Virtual Memory (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Cache Manager (David B. Probert, Ph.D.)
  • Windows Kernel Internals — I/O Architecture (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Lightweight Procedure Calls (David B. Probert, Ph.D.)
  • Windows Kernel Internals — NTFS (David B. Probert, Ph.D.)
  • Windows Kernel Internals — NT Registry Implementation (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Object Manager (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Overview (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Synchronization Mechanisms (David B. Probert, Ph.D.)
  • WinDbg. From A to Z! (Robert Kuster, 2007)
  • Why Threads Are A Bad Idea (for most purposes) (John Ousterhout, 1995)
  • When to use splay trees (Eric K. Lee ∗,† and Charles U. Martel, 2007)
  • What Happens During a Join - Dissecting CPU and Memory Optimization Effects (Stefan Manegold, Peter Boncz, Martin L. Kersten)
  • What Every Programmer Should Know About Memory (Ulrich Drepper, 2007)
  • Virtual Threads (Elaine Cheong and Fred Reiss, 2000)
  • Vim for humans (Vincent Jousse, 2015)
  • Using CUDA in Practice (Klaus Mueller)
  • Unreliable Guide To Hacking The Linux Kernel (Paul Rusty Russell, 2000)
  • Tracing Privileged Memory Accesses to Discover Software Vulnerabilities (Felix Wilhelm, 2015)
  • The UNIX Time-Sharing System (Dennis M. Ritchie and Ken Thompson, 1974)
  • The Linux Scheduler: a Decade of Wasted Cores (2016)
  • The Linux Kernel Hidden Inside Windows 10 (Ales Ionescu, 2016)
  • The AWK Programming Language (Alfred V. Aho, Brian W. Kernighan, Peter J. Weinberg, 1988)
  • TCP Fast Open (Sivasankar Radhakrishnan, Yuchung Cheng, Jerry Chu, Arvind Jain, Barath Raghavan)
  • Speeding up Networking (Van Jacobson, Bob Felderman, 2006)
  • Reverse Engineering for Beginners (Dennis Yurichev, 2013)
  • DevOps Toolchain (UpGuard)
  • Advanced SQL Injection In SQL Server Applications (Chris Anley, 2002)
  • A Unique Examination of the Buffer Overflow Condition (Terry Bruce Gillette, 2002)
  • Blindfolded SQL Injection (Ofer Maor, Amichai Shulman)
  • Blind SQL Injection (Kevin Spett)
  • Buffer overflow vulnerabilities (Peter Buchlovsky, Adam Butcher)
  • Decimalisation Table Attacks for PIN Cracking (Mike Bond, Piotr Zieliński)
  • Manipulating Microsoft SQL Server Using SQL Injection (Cesar Cerrudo)
  • PE File Infection Techniques (Konstantin Rozinov)
  • SysAdmin Magazine: Tools & Tips for Security Admins (2016)
  • PostgreSQL Portland Performance Practice Project (Mark Wong, 2009)
  • Linux Security and the Chromium Sandbox (Pati Gallardo, 2018)
  • Linux Security Review (2015)
  • Open source firewall tools Iptables and PF (Elvir Kuric)
  • Docker and High Security Microservices (Aaron Grattafiori, 2016)
  • Linux Hardening (Michael Boelen, 2016)
  • LXC, Docker, Security
  • Linux Systems Compromised (Michael Boelen, 2016)
  • Linux Security for Developers (Michael Boelen, 2016)
  • Hardened kernels for everyone (Yves-Alexis Perez, 2015)
  • Application Security Verification Standard 3.0.1 (2016)
  • OWASP Testing Guide v4 (Matteo Meucci, Andrew Muller)
  • A SysAdmin’s Essential Guide to Linux Workstation Security
  • Checklist for Penetration Testing (Mateus Felipe Tymburibá Ferreira, 2012)
  • SELinux Policy Management Framework for HIS (Luis Franco Marin, 2008)
  • The Return of Robin Hood vs Cisco ASA (Cedric Halbronn, 2018)
  • DDoS Handbook (2015)
  • DDoS Tutorial (Krassimir Tzvetanov)
  • Bypassing Same Origin Policy v1.0 (Simon Egli)
  • Using TCPDump, TCPTrace, & XPlot to Debug Network Problems (Jason Zurawski, 2013)
  • Use "strace" to Understand Your Shell (Harald König, 2015)
  • System call tracing overhead (Jörg Zinke, 2009)
  • The Linux Kernel Hackers' Guide (Michael K. Johnson, 1995)
  • Auditing Web Applications (Robert Morella, 2015)
  • Securing & Hardening Linux v1.0 (Charalambous Glafkos, 2007)
  • Security Configuration Benchmark For Apache (Ryan Barnett, 2008)
  • Introduction to Application Security and OWASP Top 10 Risks (Ralph Durkee)
  • Network Security Hardening Guide v1.2 (2017)
  • Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance (Martin Jõgi, 2017)
  • Total security in a PostgreSQL database (Robert Bernier, 2009)

pl directory

  • Niebezpieczne Google — wyszukiwanie poufnych informacji (Michał Piotrowski)
  • Hakowanie aplikacji Rootkity i Ptrace (Stefan Klaas)
  • Karty elektroniczne w PKI — znane ataki i sposoby przeciwdziałania im (Adam Augustyn, 2005)
  • Metody włamań do systemów komputerowych SQL injection (Bogusław Kluge, Karina Łuksza, Ewa M akosa)
  • Ochrona aplikacji i ważnych danych użytkownika poprzez stosowanie technik kodowania defensywnego (Kenny Kerr)
  • Obrona przed atakami typu odmowa usługi (DoS) (Marcin Żurakowski, 2004)
  • Obrona przed Fingerprinting warstwy aplikacji — tutorial
  • Praktyczna aplikacja do analizy Malware (Rubén Santamarta)
  • Prywatne wojny w sieci: poddaj się, okop, negocjuj lub stań do walki
  • Reverse engineering — analiza dynamiczna kodu wykonywalnego ELF (Marek Janiczek)
  • Robaki sieciowe
  • Rodzaje wirusów komputerowych (Bartłomiej Rudzki, Piotr Modzelewski)
  • Ewolucja Kodów Powłoki (Itzik Kotler)
  • Struktury systemów operacyjnych
  • Tryb chroniony mikroprocesorów x86 (Andrzej Stasiak)
  • Tworzenie polimorficznego szelkodu (Michał Piotrowski)
  • Wirusy
  • Własny rootkit w GNU/Linuksie (Mariusz Burdach)
  • Szperając w nagłówkach, czyli wstęp do reverse engineeringu (Wojciech Warpechowski, 2005)
  • Podstawy administracji PostgreSQL. DCL — Data Control Language. Użytkownicy, role, uprawnienia, kopie zapasowe. (Antoni Ligęza, Marcin Szpyrka)
  • Gentoo Linux Instrukcja instalacji i konfiguracji systemu
  • Aplikacje webowe na celowniku. (Leszek Miś)
  • Obowiązkowa kontrola dostępu w systemie Linux (Bartosz Brodecki, Piotr Sasak, 2007)
  • Przegląd nowych mechanizmów bezpieczeństwa w RHEL6 (Leszek Miś, 2011)
  • SELinux (Robert Jaroszuk, 2011)
  • Bezpieczeństwo aplikacji WWW (Michał Sajdak, 2015)
  • Bezpieczeństwo aplikacji WWW — Podatności w mechanizmach uploadu (Michał Sajdak, 2016)
  • Bezpieczeństwo aplikacji WWW (Michał Sajdak, 2016)
  • Bezpieczeństwo aplikacji WWW (Michał Sajdak, 2017)
  • IT Security Services (Mateusz Kocielski, 2015)
  • Administrowanie sieciami lokalnymi i serwerami (Jacek Kobus, 2016)

More Repositories

1

the-book-of-secret-knowledge

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
142,948
star
2

nginx-admins-handbook

How to improve NGINX performance, security, and other important things.
Shell
13,473
star
3

test-your-sysadmin-skills

A collection of Linux Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.
10,637
star
4

the-practical-linux-hardening-guide

This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
9,901
star
5

htrace.sh

My simple Swiss Army knife for http/https troubleshooting and profiling.
Shell
3,747
star
6

sandmap

Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Shell
1,564
star
7

linux-hardening-checklist

Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.
1,471
star
8

iptables-essentials

Iptables Essentials: Common Firewall Rules and Commands.
1,464
star
9

multitor

Create multiple TOR instances with a load-balancing.
Shell
1,044
star
10

otseca

Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Shell
482
star
11

mkchain

Open source tool to help you build a valid SSL certificate chain.
Shell
359
star
12

reload.sh

Wipe, reinstall or restore your system from running GNU/Linux distribution. Via SSH, without rebooting.
Shell
268
star
13

massh-enum

OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
Shell
145
star
14

trimstray.github.io

Personal blog [PL/EN].
HTML
37
star
15

trimstray

Something about me.
15
star