KarenWest / softwareSecurityLinks
Software Security course
☆21Updated 10 years ago
Alternatives and similar repositories for softwareSecurity
Users that are interested in softwareSecurity are comparing it to the libraries listed below
Sorting:
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Updated 6 years ago
- ☆20Updated 11 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Updated 10 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- The collection of all Python program from various CTF's☆26Updated 10 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆62Updated last year
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- ☆20Updated 3 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 5 years ago
- ☆36Updated 7 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 3 weeks ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Python Package for burprestapi☆16Updated 5 years ago
- Firmware analysis website + API☆43Updated 5 years ago