cryptax / confsec
Security, hacking conferences (list)
☆509Updated this week
Alternatives and similar repositories for confsec:
Users that are interested in confsec are comparing it to the libraries listed below
- Kinda useful notes collated together publicly☆491Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆675Updated 3 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆230Updated 3 weeks ago
- CTFs, solutions and presentations☆284Updated 2 months ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,160Updated 4 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆270Updated 4 years ago
- ☆601Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆722Updated last month
- A Bluetooth low energy capture the flag☆680Updated 5 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,036Updated 3 years ago
- Awesome Firmware Security & Other Helpful Documents☆589Updated 5 years ago
- Some security related notes☆458Updated 7 years ago
- Slide decks from my conference presentations☆364Updated last year
- A TCP/UDP based network daemon fuzzer☆514Updated 7 months ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆640Updated this week
- Script for searching the extracted firmware file system for goodies!☆1,088Updated last year
- An archive of low-level CTF challenges developed over the years☆614Updated 3 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆875Updated 5 years ago
- Collaborative malware analysis framework☆376Updated 5 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆390Updated 8 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,096Updated 3 years ago
- Ephemera and other documentation associated with the 1337list project.☆396Updated 6 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆260Updated 6 years ago
- A collection of sources of indicators of compromise.☆826Updated 3 months ago
- Radare Congress Stuff☆208Updated 2 months ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,253Updated 4 years ago