TrustworthyComputing / csaw_esc_2019Links
CSAW Embedded Security Challenge 2019
☆34Updated 5 years ago
Alternatives and similar repositories for csaw_esc_2019
Users that are interested in csaw_esc_2019 are comparing it to the libraries listed below
Sorting:
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆89Updated 3 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 6 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 7 years ago
- Writeups for the RHME3 Challenges☆52Updated 6 years ago
- ☆53Updated 6 years ago
- ☆154Updated 3 years ago
- Reproduce CVEs from ForAllSecure Vulnerabilities Lab☆112Updated 2 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- ☆188Updated 5 months ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- A tool for finding the one gadget RCE in libc☆78Updated 5 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 5 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆56Updated 7 years ago
- ☆16Updated 7 years ago
- pwn database☆16Updated 6 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- Content related to hardware hacking☆53Updated 6 years ago
- Nailgun attack on ARM devices.☆167Updated 4 years ago
- various CTF writeups☆60Updated 7 years ago
- ☆88Updated 7 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆123Updated 8 years ago