JeremyBlackthorne / RPISEC-CoursesView external linksLinks
☆182Jan 18, 2020Updated 6 years ago
Alternatives and similar repositories for RPISEC-Courses
Users that are interested in RPISEC-Courses are comparing it to the libraries listed below
Sorting:
- Ruby Regular Expression Helper Gem☆17Oct 30, 2016Updated 9 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Jan 15, 2022Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆47May 9, 2022Updated 3 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 6 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆13Jan 30, 2023Updated 3 years ago
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 5 years ago
- ☆13Feb 24, 2024Updated last year
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- A script to bring up PPPoE sessions using Python and scapy☆18Jun 18, 2015Updated 10 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆67Jun 30, 2021Updated 4 years ago
- Upload external IP so you can find your devices elsewhere☆16Mar 25, 2024Updated last year
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- Windbg Utility Tools based upon PyKD☆42Sep 9, 2020Updated 5 years ago
- Javascript keylogger with web panel☆20Dec 12, 2023Updated 2 years ago
- Course materials for Malware Analysis by RPISEC☆3,998Aug 26, 2022Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- ☆96Feb 26, 2020Updated 5 years ago
- ☆2,903Feb 8, 2026Updated last week
- ☆21Dec 1, 2021Updated 4 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆109Feb 5, 2026Updated last week
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,159Nov 14, 2020Updated 5 years ago
- DJI AES Key for Flight Controller contained within... attempted DMCA takedown☆26Aug 17, 2017Updated 8 years ago
- scapy-dhclient scapy-dhcpd scapy-pppoe-client scapy-pppoe-server☆19Aug 29, 2024Updated last year
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- ☆23Aug 18, 2024Updated last year
- ☆22Oct 24, 2016Updated 9 years ago
- Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS☆196Dec 8, 2019Updated 6 years ago
- Fork Free Fail Repeat☆48Aug 22, 2021Updated 4 years ago
- ☆27Feb 6, 2024Updated 2 years ago
- Ghidra Loader for ESP32 Flash Dumps☆22Feb 7, 2025Updated last year
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆19Jun 13, 2019Updated 6 years ago