source code and binaries related to my trainings
☆20Oct 18, 2016Updated 9 years ago
Alternatives and similar repositories for training
Users that are interested in training are comparing it to the libraries listed below
Sorting:
- Post-CTF writeups☆12Oct 28, 2016Updated 9 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 9 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- An introduction to security for developers.☆28Feb 14, 2021Updated 5 years ago
- ☆79May 13, 2016Updated 9 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆117Aug 22, 2016Updated 9 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- Material do Grupo de Estudos em Ciência de Dados☆13Jan 25, 2021Updated 5 years ago
- ☆36Jul 24, 2016Updated 9 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Nov 13, 2016Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- frameworks_base for Geeksphone Peak and Keon☆12Jan 13, 2015Updated 11 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Reproducible Analytical Pipeline of the Hospital Standardised Mortality Ratio (HSMR) quarterly publication☆11Jun 21, 2024Updated last year
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Topology library for Coq☆12Dec 24, 2015Updated 10 years ago
- A tutorial to help you make the move to GitHub☆10Jun 2, 2023Updated 2 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- A Python interface to the Earthworm Seismic Data System.☆13Oct 4, 2024Updated last year
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- An open hardware reference design based on Mitochondrik-LV.☆13Aug 21, 2024Updated last year
- Collection of generative art made by me.☆10Jul 8, 2018Updated 7 years ago
- Experiments with syntax and symbols☆15Mar 5, 2019Updated 7 years ago
- ☆13Oct 31, 2017Updated 8 years ago
- Faster, node.js focused alternative to JavaScript's native array map.☆14Feb 28, 2017Updated 9 years ago
- OpenTitan: Open source silicon root of trust☆10Feb 5, 2020Updated 6 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- ☆13Feb 18, 2026Updated 2 weeks ago
- Some notes on the relationship between the Legendre and Fourier transforms☆11Dec 18, 2025Updated 2 months ago
- Template for living data workflow☆13Jan 30, 2019Updated 7 years ago