Gclabbe / ut-msaioLinks
Publicly shareable content about the University of Texas MSAIO program
☆13Updated 3 weeks ago
Alternatives and similar repositories for ut-msaio
Users that are interested in ut-msaio are comparing it to the libraries listed below
Sorting:
- ☆12Updated 9 years ago
- Study group working through Black Hat Python: https://www.nostarch.com/blackhatpython☆14Updated 8 years ago
- ☆182Updated 5 years ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- Furbo Security Research☆39Updated 2 years ago
- EasyCTF IV☆10Updated 7 years ago
- A deliberately insecure voter database☆32Updated last month
- ☆8Updated 7 years ago
- Git repo for challenges of encryptCTF 2019☆24Updated 6 years ago
- Multi Vagrant environment with Active Directory☆12Updated 7 years ago
- Tools for investigating Log4j CVE-2021-44228☆95Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆18Updated 6 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆29Updated 8 years ago
- ☆10Updated 4 years ago
- Social Engineering for the Blue Team☆11Updated last year
- Business search, fun with rate limiting☆19Updated 5 years ago
- ☆15Updated 2 years ago
- PoC for extracting office files into PDF file metadata☆10Updated 5 years ago
- This is the code repository that accompanies my book "The Well-Grounded Python Developer"☆45Updated last year
- Python Digital Forensics [video], published by Packt☆20Updated 2 years ago
- Writeup oriented CTF☆22Updated 7 years ago
- Hands-On Penetration Testing with Python, published by Packt☆82Updated last year
- king of the hill cybersecurity competition☆30Updated 3 years ago
- Open source release of challenges and other code used in the Hack-A-Sat 2 Qualifier in 2021.☆67Updated 3 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 4 years ago
- A collection of reverse shells☆32Updated 5 years ago
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- MABEL: Malware Analysis Benchmark for Artificial Intelligence and Machine Learning☆27Updated 2 months ago
- random tools to be used for NETSEC☆25Updated 3 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆12Updated 4 years ago