emirkmo / xz-backdoor-githubLinks
History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.
☆10Updated last year
Alternatives and similar repositories for xz-backdoor-github
Users that are interested in xz-backdoor-github are comparing it to the libraries listed below
Sorting:
- ☆21Updated 4 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆94Updated 3 years ago
- Team Page☆15Updated 7 years ago
- A memorial site for Hackers and Infosec people who have passed☆135Updated last month
- ☆83Updated 3 years ago
- An Open Letter to the OWASP Board☆107Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- ☆40Updated last week
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆161Updated 7 months ago
- A workshop on Packet Crafting using Scapy.☆157Updated 5 years ago
- Trail of Bits Testing Handbook - appsec.guide☆91Updated last week
- ☆65Updated 3 years ago
- CQ, a code security scanner☆99Updated last year
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- Phoenix☆49Updated 7 years ago
- DEbian Cve REproducer Tool☆27Updated 3 weeks ago
- ☆182Updated 6 years ago
- Random tools, code snippets, etc. No guarantee that any of this stuff works.☆52Updated last year
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Corewars but within r2☆60Updated last year
- A collection of scanned, high-resolution Hacker / Information Security Stickers from various conferences☆46Updated 5 years ago
- king of the hill cybersecurity competition☆31Updated 3 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆100Updated 3 weeks ago
- Binary Protocol Differ☆118Updated 5 years ago
- A collection of reverse shells☆33Updated 6 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆315Updated last year
- Tool to find common vulnerabilities in cryptographic public keys☆309Updated this week
- Red Team Resources☆60Updated 7 years ago
- ☆25Updated 5 years ago