cesium / DPUM
Desafios de Programação da Universidade do Minho
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for DPUM
- Personal firewall for my laptop using iptables & ipv6tables. The idea is to protect my laptop while on open network.☆67Updated 2 years ago
- A sorted and updated list of security wargame sites.☆913Updated 2 months ago
- Hack Night is an open weekly training session run by the OSIRIS lab.☆1,228Updated 7 months ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,908Updated 2 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆424Updated last year
- Simple Tricks I use While Playing King Of The Hill☆17Updated 4 years ago
- My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.☆528Updated 3 months ago
- Things we learned from Capture The Flag hacking competitions we participated in.☆247Updated 3 years ago
- Write-ups for CTF challenges.☆18Updated 3 years ago
- Tutorials for getting started with Pwntools☆1,405Updated last month
- Stuff about it-security that might be good to know☆971Updated last year
- A laboratory for learning secure web and mobile development in a practical manner.☆901Updated last month
- A general collection of information, tools, and tips regarding CTFs and similar security competitions☆1,752Updated 3 years ago
- Collection of free books, papers and articles related to CTF challenges.☆362Updated 5 years ago
- ☆1,379Updated 3 years ago
- 👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets…☆162Updated 2 weeks ago
- AppSec Ezine Public Repository.☆1,110Updated last week
- A curated list of awesome infosec blog posts, courses, books and more!☆98Updated 4 years ago
- CTF Cheatsheet☆50Updated 5 months ago
- Source code from Hacking: The Art of Exploitation (Second Edition).☆414Updated 10 months ago
- My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.☆862Updated last month
- ☆1,137Updated 2 years ago
- 🤙 Security Trivia that rare people know.☆157Updated 4 years ago
- A curated list wordlists for bruteforcing and fuzzing☆784Updated last month
- Web Fuzzer☆358Updated last year
- This is the walkthrough and cheatsheet of Machines on King of the hill on the online hacking platform TryHackme.☆92Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆495Updated 7 months ago
- Web and mobile application security training platform☆1,349Updated 4 months ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆214Updated 2 years ago
- Script to install in a Fedora OS the main tools used in pentesting.☆10Updated 2 years ago
- swiss army knife for hackers☆513Updated last year