CMU-18739L-S15 / 18739L-s15-coursedocsView external linksLinks
☆40Apr 21, 2015Updated 10 years ago
Alternatives and similar repositories for 18739L-s15-coursedocs
Users that are interested in 18739L-s15-coursedocs are comparing it to the libraries listed below
Sorting:
- Practical CTF Hacking book, created by and for this class.☆52Apr 16, 2015Updated 10 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- Non-Alphanumeric Ruby for Fun and Not Much Else☆22Mar 19, 2014Updated 11 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- ☆12May 9, 2017Updated 8 years ago
- ☆12Jun 7, 2018Updated 7 years ago
- Malamute is a fuzzing toolkit initially developed to aid with regression-test based fuzzing of language interpreters☆29Jan 4, 2016Updated 10 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- KLEE in the browser☆54Updated this week
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Zeromutarts Capture the Flag 2013 challenge writeups☆22Dec 9, 2013Updated 12 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40May 3, 2014Updated 11 years ago
- Simple shellcode testing tool.☆49Feb 24, 2012Updated 13 years ago
- Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead☆16Aug 2, 2015Updated 10 years ago
- An open source, multi-architecture ROP compiler written in python☆162Jun 14, 2017Updated 8 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- A Reverse-Engineer's best friend.☆71Sep 17, 2017Updated 8 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Apr 24, 2016Updated 9 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- ☆18Oct 11, 2018Updated 7 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- OUSPG Open - Summer of Buzz with Fresh Blood, Alumni and Affiliates☆20Dec 2, 2016Updated 9 years ago
- Official repository for ASAP: High System-code Security at Low Overhead☆26Dec 3, 2015Updated 10 years ago
- ☆27Mar 1, 2022Updated 3 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22May 26, 2016Updated 9 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 11 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24May 10, 2025Updated 9 months ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- ☆22Sep 27, 2017Updated 8 years ago