FredericJacobs / Cryptography-Stanford-NotesLinks
Notes and exercices from the Cryptography class on Coursera
☆27Updated 12 years ago
Alternatives and similar repositories for Cryptography-Stanford-Notes
Users that are interested in Cryptography-Stanford-Notes are comparing it to the libraries listed below
Sorting:
- collection of evil code☆14Updated 12 years ago
- ☆23Updated 8 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆168Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 9 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 10 years ago
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- ☆92Updated last year
- IDAPython script for quick vulnerability analysis☆32Updated 11 years ago
- Semantic Binary Code Analysis Framework☆124Updated 10 years ago
- Scripting OllyDBG2 using Python is now possible!☆113Updated 11 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆171Updated 9 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆37Updated 10 years ago
- ☆16Updated 8 years ago
- ☆85Updated 2 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 10 years ago
- GryphonCTF 2016 Challenges Repository.☆17Updated 8 years ago
- ☆34Updated 9 years ago
- Binary analysis platform based on Octopus and Radare2☆78Updated 9 years ago
- Collection of scripts that were once useful for reverse engineering things☆75Updated 15 years ago
- A x86 systematic ROP payload generation☆57Updated 5 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆51Updated last year
- Advanced buffer overflow and memory corruption security challenges☆190Updated 3 years ago
- Some kernel exploits☆146Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- DARPA Cyber Grand Challenge Documentation☆117Updated 9 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 8 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆167Updated 9 years ago