Security, hacking conferences (list)
☆547Jan 27, 2026Updated last month
Alternatives and similar repositories for confsec
Users that are interested in confsec are comparing it to the libraries listed below
Sorting:
- A collected list of awesome security talks☆4,203Feb 17, 2026Updated last month
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,774Apr 3, 2024Updated last year
- ☆64Oct 24, 2015Updated 10 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,853Feb 25, 2025Updated last year
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Semantic Binary Code Analysis Framework☆125Sep 28, 2015Updated 10 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆940Nov 15, 2021Updated 4 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- gramfuzz is a grammar-based fuzzer that lets one define complex grammars to generate text and binary data formats.☆259Oct 2, 2020Updated 5 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 4 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,458Oct 1, 2025Updated 5 months ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- Demos of various injection techniques found in malware☆794Feb 15, 2022Updated 4 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆419Jun 6, 2018Updated 7 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,172May 26, 2023Updated 2 years ago
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,406Nov 24, 2025Updated 3 months ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,316Sep 3, 2019Updated 6 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,379Aug 8, 2024Updated last year
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- A collection of resources for linux reverse engineering☆2,076Jun 2, 2022Updated 3 years ago
- Android bootloader (aboot) parser☆64Apr 9, 2024Updated last year
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- A Collection of Secure Mobile Development Best Practices☆566Jan 25, 2024Updated 2 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago