InfoSecIITR / toolsLinks
  Tools of the trade
☆85Updated 3 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Stuff to read up☆247Updated 5 years ago
- Writeups for different CTF challenges☆70Updated 7 months ago
- Exploit web-vulnerabilities☆23Updated 6 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆68Updated 8 years ago
- Some security related notes☆461Updated 8 years ago
- Cracking real-world Crypto, the fun way☆19Updated 8 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 10 years ago
- Security Tool to detect arp poisoning attacks☆55Updated 7 years ago
- An experimental OS developed to learn about the internal concepts☆15Updated 8 years ago
- ☆12Updated 9 years ago
- It deobfuscates JSFuck into readable JavaScript☆40Updated 7 years ago
- ☆21Updated 7 years ago
- network security scripts and tips....☆14Updated 7 years ago
- ☆21Updated 3 years ago
- Basic Hybrid Kernal with minimal features interrupt handling, command line interface☆16Updated 9 years ago
- ☆25Updated 9 years ago
- ☆19Updated 9 years ago
- Presence application built during Microsoft's Code.Fun.Do 2k18☆25Updated 7 years ago
- A place to discuss potential projects for students of the ISIS Lab.☆383Updated 12 years ago
- Ans to the FAQ: How do you self-learn information security?☆29Updated 7 years ago
- A small implementation of blockchain protocol.☆13Updated 8 years ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆214Updated 6 years ago
- List of some useful blogs, books, courses, papers etc.☆237Updated 3 months ago
- ☆22Updated 5 years ago
- A chat app built over TCP☆18Updated 9 years ago
- An awesome resource listing and explaining various commonly used *nix commands☆157Updated 7 years ago
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- Hide information content into busy areas of images, optimally☆63Updated 8 years ago
- InfoSecIITR website☆10Updated this week
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆168Updated 7 years ago