KarenWest / softwareSecurityLinks
Software Security course
☆21Updated 10 years ago
Alternatives and similar repositories for softwareSecurity
Users that are interested in softwareSecurity are comparing it to the libraries listed below
Sorting:
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- A simple tool to organise large malicious/benign files into a organised Structure.☆1Updated 6 years ago
- Writeup from Google Capture The Flag 2018 competition☆9Updated 6 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- ☆20Updated 7 years ago
- CTF Team -TeamRocketIST's website source code.☆17Updated last year
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- ☆20Updated 3 years ago
- Malware Machine Learning☆27Updated 7 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12Updated 10 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- open source malware analysis and research notes dump☆26Updated last year
- A collection of Volatility Framework plugins.☆27Updated 11 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 10 months ago