cshelton / pacman-ctf
Python3 version of UC Berkeley's CS 188 Pacman Capture the Flag project
☆9Updated last year
Alternatives and similar repositories for pacman-ctf:
Users that are interested in pacman-ctf are comparing it to the libraries listed below
- A set of templates for different academic venues.☆27Updated 5 years ago
- Python program that implements trilateration in 3 dimensions.☆23Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆26Updated last year
- ☆18Updated 7 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- Debugging library to quickly get the minimal crashing test case☆37Updated 6 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- ☆13Updated 3 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Updated 6 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 7 years ago
- ☆22Updated 8 years ago
- ☆27Updated 2 years ago
- A ptrace based sandbox. (PoC)☆14Updated 6 years ago
- Format string exploit generation☆10Updated 9 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Updated 6 years ago
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆27Updated 7 years ago
- ☆9Updated 6 years ago
- A socket to rule all other sockets.☆9Updated 9 years ago
- A set of modeling tools for security analysis (attack tree, attack impact) and a code generator to produce code for the seL4 platform fro…☆16Updated 6 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 4 years ago
- Reproduction Code for FSE Paper "DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks"☆12Updated 4 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- ☆13Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- An quantum operating system built around ARTIQ and NV centers in diamond.☆12Updated 7 years ago
- This is an example of SSH Man in the Middle (MITM) attack using Mininet and Ettercap☆15Updated 9 years ago
- Brainfuck architecture module and loader for Binary Ninja☆15Updated 3 years ago