bjh7242 / NECCDC-2017-ConfigsView external linksLinks
Configs for NECCDC 2017
☆16Mar 22, 2017Updated 8 years ago
Alternatives and similar repositories for NECCDC-2017-Configs
Users that are interested in NECCDC-2017-Configs are comparing it to the libraries listed below
Sorting:
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 8 years ago
- a python framework for hooking pure python functions☆27Jun 7, 2021Updated 4 years ago
- Run commands on linux through those pesky firewalls☆28Jul 21, 2015Updated 10 years ago
- iOS 11.3.1 exploit☆48Dec 26, 2018Updated 7 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Aug 26, 2013Updated 12 years ago
- User support forum for Inkdrop☆10Sep 11, 2017Updated 8 years ago
- Documentation generator for the Go programming language☆11Apr 21, 2011Updated 14 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆12Jan 30, 2026Updated 2 weeks ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- This is the main repository for the OpenRepeater Project where WIKIs and Issues live.☆22Nov 28, 2020Updated 5 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- MMORPG server emulator☆12Aug 26, 2018Updated 7 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Seecurity helper tool to detect entry points of WordPress plugins☆10May 16, 2024Updated last year
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- ☆12Oct 3, 2023Updated 2 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Feb 12, 2022Updated 4 years ago
- Bitcoin and Cryptocurrency Technologies by Princeton University (https://www.coursera.org/learn/cryptocurrency)☆17Jan 20, 2017Updated 9 years ago
- UPDATED: All the action is at https://github.com/xsscx/srd☆12Jul 12, 2021Updated 4 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 7 years ago
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Feb 15, 2019Updated 7 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- Create a stream from one or more memory regions.☆12Jan 22, 2024Updated 2 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 9 months ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 6 years ago