Vector35 / csaw-2019-pwny-raceView external linksLinks
Challenges from CSAW 2019 Pwn Race Edition
☆12Nov 8, 2019Updated 6 years ago
Alternatives and similar repositories for csaw-2019-pwny-race
Users that are interested in csaw-2019-pwny-race are comparing it to the libraries listed below
Sorting:
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- ☆17Jun 17, 2022Updated 3 years ago
- Binary ninja plugins☆17Sep 15, 2016Updated 9 years ago
- This repository is to maintain all hypersign repositories and documentations☆10Mar 20, 2020Updated 5 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 5 years ago
- Linux Developer Libraries☆12May 8, 2017Updated 8 years ago
- Slides and Workshop Instructions for a BPF Introduction @Sqreen☆12Sep 10, 2019Updated 6 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- A Framework for Machine Learning on Encrypted Data☆12Feb 10, 2022Updated 4 years ago
- CS 495/595 Web Security☆10Feb 27, 2022Updated 3 years ago
- This is an example of a project with continuous fuzzing integration☆11Jul 26, 2020Updated 5 years ago
- A cross-platform, GPU-accelerated terminal emulator (debian packaging fork)☆11Aug 13, 2024Updated last year
- ☆13Apr 12, 2019Updated 6 years ago
- quick'n dirty hack to invoke ARM SMC instruction from userland through debugfs☆14Sep 4, 2016Updated 9 years ago
- Part II of the tutorial for making a PoC in foundry for Immunefi☆11Aug 29, 2022Updated 3 years ago
- ☆10Feb 16, 2021Updated 5 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Read/write VTIL files in Rust.☆11May 21, 2021Updated 4 years ago
- Update Readonly Properties☆10Aug 14, 2018Updated 7 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Post-CTF writeups☆12Oct 28, 2016Updated 9 years ago
- C++ realisation of gnfs algorithm☆13Aug 5, 2020Updated 5 years ago
- ☆12Jun 2, 2020Updated 5 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- ☆11Nov 30, 2015Updated 10 years ago
- Email digest aggregator for fail2ban☆13Oct 9, 2024Updated last year
- ☆10Dec 8, 2022Updated 3 years ago
- Linear IL view for Binary Ninja☆13Feb 28, 2017Updated 8 years ago
- ☆10May 25, 2023Updated 2 years ago
- public-pentesting-reports☆12Aug 23, 2016Updated 9 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Dec 3, 2024Updated last year
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Nov 27, 2025Updated 2 months ago
- 🕹 Classic Asteroids game made with P5.js and jQuery☆12Mar 25, 2018Updated 7 years ago
- 3.60 module dump☆10Aug 26, 2016Updated 9 years ago