Es7evam / Security-StudiesLinks
Some guides about general topics on information security
☆13Updated 6 years ago
Alternatives and similar repositories for Security-Studies
Users that are interested in Security-Studies are comparing it to the libraries listed below
Sorting:
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- ☆20Updated 3 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 5 years ago
- ☆14Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- ☆19Updated 11 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- frida snippet generator firefox extension for developer.android.com☆23Updated 3 years ago
- ☆26Updated 3 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆20Updated 4 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 5 years ago
- Modern Binary Exploitation write-ups.☆4Updated 5 years ago
- ☆13Updated 4 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Updated 4 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago
- ☆20Updated 5 years ago
- Simple vulnerability scanning framework☆50Updated 8 years ago
- ☆26Updated 3 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago