KarenWest / softwareSecurity
Software Security course
☆21Updated 9 years ago
Alternatives and similar repositories for softwareSecurity:
Users that are interested in softwareSecurity are comparing it to the libraries listed below
- Writeup from Google Capture The Flag 2018 competition☆9Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 4 years ago
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- ☆13Updated 5 years ago
- ☆18Updated 5 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- List of Red Team Repositories☆17Updated 5 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆33Updated 7 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 5 months ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Updated 7 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- ☆19Updated 10 years ago
- Journey to conquer the OSCP!☆13Updated 5 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- public exploits☆35Updated last year
- Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the hel…☆17Updated 3 years ago
- ☆20Updated 6 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆38Updated last year
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 4 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Updated 6 years ago
- Self defense post module for metasploit☆17Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago