cryptax / confsec
Security, hacking conferences (list)
☆522Updated this week
Alternatives and similar repositories for confsec:
Users that are interested in confsec are comparing it to the libraries listed below
- The Damn Vulnerable Router Firmware Project☆685Updated 4 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- Some security related notes☆458Updated 7 years ago
- CTFs, solutions and presentations☆288Updated last week
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆275Updated 4 years ago
- Kinda useful notes collated together publicly☆491Updated 5 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆232Updated last month
- ☆607Updated 2 years ago
- Collaborative malware analysis framework☆375Updated 6 years ago
- A colleciton of CTF write-ups all using pwntools☆511Updated 8 years ago
- Reverse Engineering Resources☆223Updated 6 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆181Updated 5 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆385Updated 2 years ago
- A collection of sources of indicators of compromise.☆849Updated 6 months ago
- Red Team Tactics, Techniques, and Procedures☆399Updated last month
- Interview questions to screen offensive (red team/pentest) candidates☆881Updated 6 years ago
- Attify OS - Distro for pentesting IoT devices☆979Updated 3 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆749Updated 4 months ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆392Updated 8 years ago
- An archive of low-level CTF challenges developed over the years☆629Updated 3 years ago
- Damn Vulnerable IoT Device☆201Updated last year
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆417Updated 2 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆324Updated 3 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,188Updated 4 years ago
- FAME Automates Malware Evaluation☆889Updated 3 weeks ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 7 years ago
- Script for searching the extracted firmware file system for goodies!☆1,114Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,103Updated 3 years ago
- A Bluetooth low energy capture the flag☆693Updated 8 months ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago