Cyber Security Challenge Australia 2014 Files
☆18May 9, 2014Updated 11 years ago
Alternatives and similar repositories for CySCA2014
Users that are interested in CySCA2014 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Security Challenge Australia 2015 Files☆40Oct 28, 2016Updated 9 years ago
- My Presentations in PDF☆29Apr 20, 2016Updated 9 years ago
- Use packer to provision a windows AMI, it installs software using powershell☆10Sep 5, 2016Updated 9 years ago
- Common Corpus is used to build coverage-minimized corpus data sets for fuzzing.☆29Aug 16, 2023Updated 2 years ago
- Tools for the Nintendo 3DS☆10Apr 16, 2014Updated 11 years ago
- A fork of OpenLP church projection software☆12Aug 21, 2017Updated 8 years ago
- ☆72Dec 23, 2014Updated 11 years ago
- ☆13Dec 19, 2019Updated 6 years ago
- Automate vulnerability triage which prioritizes remediation over discovery☆20Updated this week
- ☆33Feb 25, 2026Updated 3 weeks ago
- 新楓之谷 ARC / AUT 計算機☆17Dec 27, 2023Updated 2 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Updated this week
- ☆10Feb 8, 2024Updated 2 years ago
- Android app for tracking the locations of pokemon in pokemon go. Open for additions!☆17Oct 4, 2016Updated 9 years ago
- This plugin is for Flarum using Wechat third-party login. we plan to restart it on the way.☆17Aug 8, 2017Updated 8 years ago
- ☆14Aug 27, 2024Updated last year
- Automatic shiny finder / breeder for Pokemon X/Y☆15Oct 11, 2014Updated 11 years ago
- Read input from Twitch, and send keys to other programs☆15Nov 4, 2015Updated 10 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 8 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- A Discord Chat Bot for MapleStory☆12Jan 12, 2023Updated 3 years ago
- My talks...☆25Feb 27, 2025Updated last year
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- A PHP module for generating the AST tree of a PHP source code, useful for userland tools for static code analysis, a preprocessor, eventu…☆26Feb 24, 2012Updated 14 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 11 months ago
- Sample code of Ticwear API usage.☆20Dec 19, 2017Updated 8 years ago
- A simple operating system (SOS) built on top of the seL4 microkernel☆12Mar 3, 2018Updated 8 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- ☆45Jul 6, 2024Updated last year
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Jan 21, 2026Updated 2 months ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- Burp plugin for jxscout☆20May 12, 2025Updated 10 months ago
- ☆12May 6, 2020Updated 5 years ago
- Toy approach to VMProtect virtualization☆16Oct 26, 2018Updated 7 years ago
- (Keras) Use deep Q-learning to build two Gomoku (Five-in-a-Row) agents playing against each other.☆19Oct 8, 2016Updated 9 years ago
- ☆16Apr 17, 2018Updated 7 years ago