Insomnihack / Insomnihack-2015Links
Repository for Insomni'hack finals 2015
☆22Updated 10 years ago
Alternatives and similar repositories for Insomnihack-2015
Users that are interested in Insomnihack-2015 are comparing it to the libraries listed below
Sorting:
- CTF & practice exploit collection☆38Updated 8 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- GDB commands to aid exploit development☆46Updated 9 years ago
- Vagrant files to bootstrap VM for CTFs☆11Updated 9 years ago
- ☆14Updated 9 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Firmware analysis website + API☆43Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- ☆50Updated 8 years ago
- ☆25Updated 2 months ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- Configuration security audit framework☆21Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 8 years ago
- ☆44Updated 8 years ago
- ☆21Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- ☆50Updated 2 weeks ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- ☆101Updated 4 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆45Updated 8 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 8 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago