Es7evam / Security-Studies
Some guides about general topics on information security
☆13Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Security-Studies
- ☆26Updated 3 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- ☆20Updated 2 years ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 4 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆58Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆64Updated 3 years ago
- Pwn2Win 2020 Challenges☆54Updated 3 years ago
- CTFs I've played so far☆17Updated last year
- A simple python3 script that generate unicode payloads..☆9Updated 4 years ago
- Insecure Deserialization, PDF and lab☆17Updated 5 years ago
- ☆26Updated 2 years ago
- Some of my flag protected writeups☆11Updated 4 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆33Updated 4 years ago
- Scripts I used during CTP☆67Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆49Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated 10 months ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆19Updated 4 years ago
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- ☆24Updated 6 months ago
- ☆16Updated 4 years ago
- a repo of links to useful writeups of pwn challenges☆25Updated 6 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 5 years ago