MeghaJakhotia / ComputerSecurityAttacksLinks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆120Updated 5 years ago
Alternatives and similar repositories for ComputerSecurityAttacks
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below
Sorting:
- SEED Labs developed in the last 20 years.☆853Updated this week
- Records & Reports for Seed-project☆95Updated 4 years ago
- Source code for my books☆163Updated 2 years ago
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆45Updated 5 years ago
- ✍️ All of the challenges I have written for CTFs☆54Updated 3 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆101Updated 3 months ago
- Tutorials for getting started with Pwntools☆1,489Updated 9 months ago
- Writeups for various CTFs☆651Updated last month
- Infrastructure powering the pwn.college dojo☆374Updated this week
- A sorted and updated list of security wargame sites.☆1,033Updated last week
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆54Updated this week
- Online textbook for CS 161: Computer Security at UC Berkeley.☆80Updated 7 months ago
- A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩☆615Updated 8 months ago
- This repository contains my implementation of SEED Labs☆14Updated 5 years ago
- JerseyCTF 2022☆27Updated 3 years ago
- knowledge is power☆220Updated last month
- The RSA algorithm coded in Python☆35Updated 2 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆242Updated 2 years ago
- A Python framework for creating emulation of the Internet.☆253Updated 2 weeks ago
- vulnerability detection in python source code with LSTM networks☆145Updated 5 years ago
- GDBP-PEDA Cheat Sheet☆16Updated 8 years ago
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆703Updated 4 months ago
- CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and…☆163Updated last year
- Solutions (that we managed to find) for the 2021 PicoCTF☆162Updated last year
- List of tools and commands that may be helpful in CTFs☆231Updated last year
- Source code of the challenges developed for the 2024 edition of openECSC☆73Updated 9 months ago
- An overview of LLMs for cybersecurity.☆989Updated 2 months ago
- Assignments of the dragon book, 2nd☆12Updated 7 years ago
- An interactive module to help you learn how to fuzz your first target☆178Updated 11 months ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year