KarenWest / softwareSecurityLinks
Software Security course
☆23Updated 10 years ago
Alternatives and similar repositories for softwareSecurity
Users that are interested in softwareSecurity are comparing it to the libraries listed below
Sorting:
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Updated 7 years ago
- ☆20Updated 11 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Simple vulnerability scanning framework☆51Updated 9 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆14Updated 8 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Updated 8 years ago
- Collection of Android security related resources☆104Updated 2 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆19Updated 6 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 4 months ago
- ☆18Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 9 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆42Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Proof of Concept's provided by Source Incite☆37Updated 8 years ago
- Scripts for OSCE☆18Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆37Updated 7 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 7 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 5 years ago
- SLAE x86 from Pentester Academy☆14Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆78Updated 6 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago