archang31 / aacs4-writeupsLinks
All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs
☆21Updated 5 years ago
Alternatives and similar repositories for aacs4-writeups
Users that are interested in aacs4-writeups are comparing it to the libraries listed below
Sorting:
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆19Updated last year
- A curated list of resources for the OSED journey.☆71Updated 3 years ago
- A repo to support the book☆111Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- ☆196Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- esoteric☆55Updated 5 years ago
- ☆55Updated last year
- RE / Binary Exploitation Resources☆72Updated 8 years ago
- ☆54Updated 2 years ago
- PCAP visualization tool☆104Updated 2 years ago
- ☆64Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆78Updated 2 years ago
- The best resources for learning exploit development☆120Updated 6 years ago
- ☆15Updated 4 years ago
- 0xpat blog☆109Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆301Updated 5 years ago
- ☆82Updated 8 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 6 years ago
- Malware Analysis Exercise Samples and Resources☆53Updated 3 weeks ago
- OSEE Preparation☆191Updated 6 years ago
- Windbg Readable & Dark Green Theme - Own Use☆46Updated 6 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Run several volatility plugins at the same time☆115Updated 3 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆51Updated 4 years ago
- Code snips and notes☆137Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆124Updated 2 years ago