LiveOverflow / security-researchLinks
Security Research
☆39Updated 2 years ago
Alternatives and similar repositories for security-research
Users that are interested in security-research are comparing it to the libraries listed below
Sorting:
- redpwn's challenge deployment system☆28Updated last year
- CTF write-ups☆86Updated 6 months ago
- ☆50Updated last year
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Small example repo for looking into log4j CVE-2021-44228☆71Updated 3 years ago
- CVE-2021-3156 - Sudo Baron Samedit☆221Updated 3 years ago
- ☆46Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- Where CTFs happen☆81Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Collection of pwn techniques☆29Updated 3 years ago
- ☆83Updated 7 years ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆37Updated 8 months ago
- Binary Golf Grand Prix☆112Updated last year
- The official challenges and deployment source code files used in San Diego CTF 2022.☆27Updated 3 years ago
- Binary Golf Grand Prix☆60Updated 3 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- archive of the released challenges from corCTF 2021☆23Updated 3 years ago
- Assembly needs a modern makeover! Aski is a compiled programming language allowing programming as low abstraction as Assembly but a synta…☆24Updated 4 years ago
- esoteric☆54Updated 4 years ago
- Gonna share my writeups and resources here☆65Updated 5 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆27Updated 3 years ago
- 'Ike: A binary exploitation and reversing handbook.☆81Updated 5 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆117Updated last year
- auto-ropper☆17Updated 2 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆12Updated last year
- visualizing CTF clusters (teams playing together at DEFCON)☆27Updated 2 years ago
- Collection of Source Code and Binaries of the reversing challenges by Elemental X☆5Updated last year