gynvael / zrozumiec-programowanie-cwiczeniaLinks
Rozwiązania ćwiczeń z książki "Zrozumieć Programowanie"
☆27Updated last year
Alternatives and similar repositories for zrozumiec-programowanie-cwiczenia
Users that are interested in zrozumiec-programowanie-cwiczenia are comparing it to the libraries listed below
Sorting:
- Gynvael's Livestream code☆136Updated 2 years ago
- My solutions to Matasano Cryptopals challenge.☆30Updated 10 years ago
- A simple tool to manipulate window objects in Windows☆44Updated 8 years ago
- Rather bad Windows/Linux RPC interface specialized for a Windows-host/Linux-guest configuration.☆55Updated 6 years ago
- Random tools, code snippets, etc. No guarantee that any of this stuff works.☆51Updated last year
- unhash is a set of tools designed to enable better password auditing☆119Updated 3 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22Updated 9 years ago
- Hacking Games in a Hacked Game☆29Updated 10 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- Challenges for INShAck 2018☆25Updated 6 years ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- ☆21Updated 6 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Updated 5 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆87Updated 7 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- Reverse engineering challenges☆51Updated 5 years ago
- A cryptographic crib maniplation tool☆20Updated 12 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- ☆25Updated 4 months ago
- ☆14Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- Open and censorship resistant crackmes repository☆129Updated 5 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Updated 7 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Updated 7 years ago