cryptax / confsec
Security, hacking conferences (list)
☆498Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for confsec
- CTFs, solutions and presentations☆286Updated 2 months ago
- Kinda useful notes collated together publicly☆492Updated 5 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆225Updated this week
- Some security related notes☆457Updated 7 years ago
- A collection of sources of indicators of compromise.☆802Updated last month
- Red Team Tactics, Techniques, and Procedures☆394Updated last week
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆257Updated 6 years ago
- A colleciton of CTF write-ups all using pwntools☆504Updated 8 years ago
- Collaborative malware analysis framework☆375Updated 5 years ago
- PwnWiki - The notes section of the pentesters mind.☆554Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆671Updated 3 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆179Updated 7 years ago
- kernel privilege escalation enumeration and exploitation framework☆687Updated 6 years ago
- OPCDE Cybersecurity Conference Materials☆606Updated 4 years ago
- Issues to consider when planning a red team exercise.☆611Updated 7 years ago
- All my infosec notes I have been building up over the years☆328Updated 3 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆269Updated 4 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆731Updated 2 years ago
- A handy collection of my public exploits, all in one place.☆597Updated 10 months ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,123Updated 3 years ago
- ☆590Updated last year
- Ephemera and other documentation associated with the 1337list project.☆396Updated 6 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆513Updated 3 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,029Updated 3 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,090Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,247Updated 4 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 5 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆871Updated 5 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 3 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆399Updated last year