☆181Jan 18, 2020Updated 6 years ago
Alternatives and similar repositories for RPISEC-Courses
Users that are interested in RPISEC-Courses are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slides and stuffs of the meetings during the 2020.☆16Jan 18, 2022Updated 4 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,972Dec 9, 2021Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆47May 9, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 4 months ago
- ☆10Nov 19, 2016Updated 9 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Fork Free Fail Repeat☆49Aug 22, 2021Updated 4 years ago
- fun rootkits stuff!☆20Jul 28, 2015Updated 10 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 10 years ago
- WLAN Receiver for GNU Radio on Android☆13Aug 4, 2020Updated 5 years ago
- Windbg Utility Tools based upon PyKD☆42Sep 9, 2020Updated 5 years ago
- Course materials for Malware Analysis by RPISEC☆4,019Aug 26, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Jan 15, 2022Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64May 21, 2023Updated 2 years ago
- ☆38Jan 6, 2025Updated last year
- ☆15Oct 29, 2024Updated last year
- ☆13Feb 24, 2024Updated 2 years ago
- ☆2,981Feb 8, 2026Updated 3 months ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Collection of things made during my preparation to take on OSEE☆103Jul 30, 2019Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆22Dec 1, 2021Updated 4 years ago
- Exploitation and Mitigation Slides☆136Jun 4, 2024Updated last year
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,166Nov 14, 2020Updated 5 years ago
- An in depth tutorial on how to do binary exploitation☆454Jun 19, 2018Updated 7 years ago
- Script to crawl crbugs (Chromium Issues).☆10Jul 15, 2021Updated 4 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 6 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 11 months ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Slides, exploits and PoCs :)☆94Jan 12, 2019Updated 7 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆748Nov 1, 2024Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 9 years ago
- Build a database of libc offsets and ld.so files to simplify exploitation☆13Sep 13, 2018Updated 7 years ago
- ☆90Jun 15, 2022Updated 3 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Aug 28, 2020Updated 5 years ago
- PathFinder is a tool designed to visualize call graphs of source code.☆14Dec 3, 2024Updated last year