andrealan / Software-Security-Lab
☆9Updated 4 years ago
Related projects: ⓘ
- RSArmageddon☆27Updated 7 months ago
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆24Updated 10 months ago
- A simple Python 3 script to perform Common Modulus attacks on RSA☆35Updated 4 years ago
- CTF Writeups☆15Updated 2 years ago
- esoteric☆50Updated 4 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 2 years ago
- Source code and documentation for TeamItaly CTF 2022 challenges☆40Updated last year
- 🐍 Solving CTF challenges using Z3 and Python☆47Updated last year
- Source files and writeups for UTCTF 2020☆35Updated 4 years ago
- CVE-2021-3156: Sudo heap overflow exploit for Debian 10☆50Updated 2 years ago
- Source code of the challenges developed for the 2024 edition of openECSC☆48Updated 2 months ago
- Set of pre-generated pwn.college challenges☆58Updated last year
- Writeups for each ctf we have partecipated☆40Updated last year
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 2 years ago
- Notes and challenges from the HeapLAB course taught by Max Kamper.☆16Updated 3 years ago
- Udemy – Linux Heap Exploitation☆33Updated 3 years ago
- Scarica il file e mandami un writeup se riesci a risolvere la CTF :)☆23Updated last year
- TCP flow analyzer with sugar for A/D CTF☆138Updated last year
- reverse engninering & pwn writeup☆23Updated 4 years ago
- Writeups of some Reverse Engineering challenges in CTFs I played☆27Updated 3 years ago
- ☆26Updated 2 years ago
- Source code and documentation for TeamItaly CTF 2023 challenges☆18Updated 11 months ago
- Writeups for CTFs☆57Updated this week
- Software Reverse Engineering with Ghidra, published by Packt☆137Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆79Updated last year
- Simple volatility profile builder based on Docker container☆22Updated 4 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 7 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆139Updated last year