An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities
☆21Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for TimeGap-Theory
Users that are interested in TimeGap-Theory are comparing it to the libraries listed below
Sorting:
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- An assistant for BinDiff☆25Feb 21, 2023Updated 3 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- ☆11Feb 14, 2023Updated 3 years ago
- Study and research with your docs, media, and AI in one place☆33Updated this week
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- darknet crawler to map links☆10Apr 15, 2020Updated 5 years ago
- ☆13Nov 5, 2024Updated last year
- ☆88Aug 16, 2025Updated 6 months ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆79Mar 23, 2020Updated 5 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- ☆17Feb 3, 2026Updated 3 weeks ago
- Challenge USI 2011 - Equipe 10 - Jaxio & Friends☆11Sep 13, 2011Updated 14 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- ☆19Jan 15, 2026Updated last month
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Terraform code and Sentinel policies for HashiConf-2019 talk/demo☆10Sep 23, 2019Updated 6 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ☆16May 13, 2021Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Dashboard/API + DNS/HTTP Servers to identify Out of Band Resolution in Payloads☆38Jun 10, 2021Updated 4 years ago
- crashmon - A LLDB Based replacement for CrashWrangler☆46Nov 25, 2023Updated 2 years ago
- Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS☆10Jun 6, 2020Updated 5 years ago
- Want to use your Gmail address to login to Vault? This demo shows you how!☆12Apr 9, 2019Updated 6 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago