Nieuport / news-and-links
☆37Updated this week
Alternatives and similar repositories for news-and-links:
Users that are interested in news-and-links are comparing it to the libraries listed below
- DEbian Cve REproducer Tool☆24Updated last year
- Random tools, code snippets, etc. No guarantee that any of this stuff works.☆50Updated last year
- ☆20Updated 3 years ago
- Anti-reverse Compilation☆33Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- A curated list of argument injection vectors☆40Updated 3 months ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Scapy hands-on☆34Updated last year
- A series of writes about “Binary Exploitation”.☆85Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- ☆55Updated 6 months ago
- ☆37Updated 4 years ago
- ☆77Updated 10 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- A binary hardening system☆107Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 4 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- ☆18Updated 4 years ago
- SSD Challenges☆47Updated 2 years ago
- ☆25Updated 2 years ago
- Binary Golf Library☆62Updated 3 years ago
- ☆13Updated 4 years ago
- Protocol Reverse Engineering Resources☆21Updated last year
- Userland exec PoC to be used as attack vector technique☆85Updated 2 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆62Updated 5 months ago
- A beginner-friendly CTF about Kubernetes security.☆77Updated 2 years ago