cryptax / confsec
Security, hacking conferences (list)
☆523Updated this week
Alternatives and similar repositories for confsec
Users that are interested in confsec are comparing it to the libraries listed below
Sorting:
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆233Updated 2 months ago
- Some security related notes☆458Updated 7 years ago
- Kinda useful notes collated together publicly☆493Updated 5 years ago
- CTFs, solutions and presentations☆287Updated 2 weeks ago
- The Damn Vulnerable Router Firmware Project☆687Updated 4 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆884Updated 6 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆420Updated 3 years ago
- A Course on Intermediate Level Linux Exploitation☆1,001Updated 4 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆387Updated 2 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,199Updated 4 years ago
- A colleciton of CTF write-ups all using pwntools☆513Updated 8 years ago
- ☆609Updated 2 years ago
- A TCP/UDP based network daemon fuzzer☆520Updated 11 months ago
- Damn Vulnerable IoT Device☆203Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆765Updated 5 months ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆315Updated 6 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,106Updated 3 years ago
- Red Team Tactics, Techniques, and Procedures☆402Updated 2 months ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆274Updated 4 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆264Updated 6 years ago
- the Network Protocol Fuzzer that we will want to use.☆758Updated last year
- A CTF framework to create, build, deploy and monitor challenges☆113Updated 3 weeks ago
- Script for searching the extracted firmware file system for goodies!☆1,121Updated last year
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 4 years ago
- Slide decks from my conference presentations☆363Updated last year
- ☆280Updated 4 years ago
- All my infosec notes I have been building up over the years☆336Updated 2 months ago
- Vulnerability examples.☆404Updated last year