KarenWest / softwareSecurityLinks
Software Security course
☆21Updated 10 years ago
Alternatives and similar repositories for softwareSecurity
Users that are interested in softwareSecurity are comparing it to the libraries listed below
Sorting:
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 11 months ago
- Collection of Android security related resources☆103Updated last year
- Writeup from Google Capture The Flag 2018 competition☆9Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- The collection of all Python program from various CTF's☆26Updated 9 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆33Updated 8 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Firmware analysis website + API☆43Updated 4 years ago
- CapFuzz - capture, fuzz & intercept web traffic.☆64Updated 5 years ago
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- ☆13Updated 8 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- ☆20Updated 11 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆21Updated 6 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated 7 months ago
- Telco training☆26Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago