clarencecastillo / NTUOSS-GitWorkshopLinks
Workshop on Git for NTU Open Source Society
☆12Updated 6 years ago
Alternatives and similar repositories for NTUOSS-GitWorkshop
Users that are interested in NTUOSS-GitWorkshop are comparing it to the libraries listed below
Sorting:
- CTF Bot for Discord☆6Updated 2 years ago
- Challenges from pbctf 2020☆33Updated 4 years ago
- sample code/text used in NTU HPC Internal Training during AY2018-2019☆24Updated 6 years ago
- ctf solutions☆82Updated last year
- DiceCTF 2021 challenge archive☆22Updated 4 years ago
- My solutions to RPISEC's Modern Binary Exploitation course lab☆14Updated 7 years ago
- Pure Python hash length extension module☆125Updated 2 years ago
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆84Updated 10 months ago
- Pwnable tips & writeups.☆22Updated 8 years ago
- ☆17Updated 5 years ago
- A general way to Recover Safe linking protected value/pointer☆11Updated 2 years ago
- ☆42Updated 3 years ago
- Collection of pwn techniques☆29Updated 3 years ago
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago
- ☆15Updated 5 years ago
- My CTF write-ups☆27Updated 3 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- Writeups for HITCON CTF 2020☆10Updated 4 years ago
- RootersCTF 2019 challenges☆18Updated 5 years ago
- Writeup for the OverTheWire Advent Bonanza 2019 CTF (https://advent2019.overthewire.org/)☆14Updated 5 years ago
- Write-ups to CTF challenges☆30Updated 4 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆34Updated 3 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- CTF writeups☆12Updated 4 years ago
- Home-made *nix-like kernel.☆11Updated 4 years ago
- A collection of my CTF writeups☆17Updated 4 months ago
- CTF solve scripts. Some writeups on my blog, others on my gist. Check the challenge directories for links.☆10Updated last year
- ☆63Updated 2 years ago
- Implementation of attacks on cryptosystems☆73Updated 4 years ago