TrustworthyComputing / csaw_esc_2019Links
CSAW Embedded Security Challenge 2019
☆37Updated 5 years ago
Alternatives and similar repositories for csaw_esc_2019
Users that are interested in csaw_esc_2019 are comparing it to the libraries listed below
Sorting:
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 6 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- A tool for finding the one gadget RCE in libc☆78Updated 5 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆90Updated 7 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆113Updated 6 years ago
- ☆89Updated 3 years ago
- Content related to hardware hacking☆53Updated 6 years ago
- CSAW Embedded Security Challenge 2020☆26Updated 5 years ago
- Writeups for the RHME3 Challenges☆53Updated 6 years ago
- Ledger Donjon CTF 2020☆17Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 6 years ago
- ☆188Updated 7 months ago
- ☆54Updated 7 years ago
- ☆11Updated 4 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆46Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- pwn database☆16Updated 6 years ago
- ☆47Updated 6 years ago
- ☆156Updated 3 years ago
- RHme+ 2015 challenge☆114Updated 9 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- various CTF writeups☆61Updated 7 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Updated 10 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆127Updated 8 years ago
- Code and exercises for a workshop on z3 and angr☆233Updated 4 years ago