TrustworthyComputing / csaw_esc_2023
☆15Updated 4 months ago
Alternatives and similar repositories for csaw_esc_2023:
Users that are interested in csaw_esc_2023 are comparing it to the libraries listed below
- Automatic tool to quickly start a pwn CTF challenge☆41Updated last year
- libdebug is a python library to automate the debugging of a binary executable.☆157Updated this week
- Write-ups for various CTF☆186Updated last year
- ropr with some tweaks for better linux kernel support☆17Updated 10 months ago
- Python library for CTFer☆133Updated last month
- ☆11Updated 5 months ago
- Main HALucinator branch☆40Updated last year
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆182Updated 6 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆439Updated this week
- Resources to getting started vulnerability research on IoT/embedded devices.☆41Updated 3 weeks ago
- ☆85Updated 9 months ago
- knowledge is power☆208Updated 11 months ago
- A toolkit for cryptanalysis using lattices.☆115Updated last year
- Kernel development & exploitation practice environment.☆221Updated last year
- ☆12Updated 8 months ago
- kernel-pwn and writeup collection☆594Updated last year
- ☆315Updated 8 months ago
- ☆167Updated 3 weeks ago
- Python module for demangling rust function names☆17Updated 3 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆16Updated 3 weeks ago
- A full English version of the popular ctf-wiki☆87Updated 7 months ago
- Repository for monolithic firmware blobs☆71Updated 2 years ago
- ☆178Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆28Updated 6 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆190Updated 7 months ago
- ☆160Updated 2 years ago
- An open-source SBox analysis utility☆12Updated last year
- 'Ike: A binary exploitation and reversing handbook.☆74Updated last month
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆127Updated 11 months ago