huiwenhw / interview-prep
Cheatsheet for technical interviews
☆22Updated 6 years ago
Related projects: ⓘ
- Ans to the FAQ: How do you self-learn information security?☆29Updated 6 years ago
- Security attack and protection☆22Updated 6 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 6 years ago
- Write ups for DRDO CTF☆10Updated 6 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 11 years ago
- ☆51Updated 6 years ago
- Practical CTF Hacking book, created by and for this class.☆50Updated 9 years ago
- GryphonCTF 2016 Challenges Repository.☆17Updated 6 years ago
- ☆26Updated 6 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 4 years ago
- ☆19Updated this week
- Materials for CTF101 Day 2 (Systems Security)☆11Updated 7 years ago
- Pwnable tips & writeups.☆21Updated 7 years ago
- Writeups for Pico CTF 2017 capture the flag hacking compeition☆14Updated 6 years ago
- List of materials used during TGIFHacks workshops by NTUOSS.☆17Updated last year
- jeap, exploit 10 in 0ctf 2016 quals☆15Updated 8 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆21Updated 9 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Updated 7 years ago
- Collection of modified open fuzzer.☆30Updated 12 years ago
- Z3 Symbolic Execution python☆28Updated 6 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆11Updated 7 years ago
- QEMU modified to run CGC binaries.☆13Updated 2 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 8 years ago
- ☆9Updated 7 months ago
- ☆40Updated this week
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Updated 8 years ago
- Writeups for different CTF challenges☆68Updated 5 months ago
- ☆10Updated this week
- Stuff related with piracy☆10Updated 3 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 5 years ago