Scripts and Writeups for the NSA Codebreaker Challenge 2019
☆63Sep 13, 2021Updated 4 years ago
Alternatives and similar repositories for NSACodebreaker19
Users that are interested in NSACodebreaker19 are comparing it to the libraries listed below
Sorting:
- NSA Codebreaker Challenge 2019 write-ups.☆21Jan 4, 2020Updated 6 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Apr 20, 2020Updated 5 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- ☆16Mar 23, 2018Updated 7 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Code from the book "FreeBSD Device Drivers: A Guide for the Intrepid"☆12Oct 10, 2016Updated 9 years ago
- Official CTF for 44CON 2019☆17Jul 22, 2023Updated 2 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- Tools for working with npdm, desc files.☆15Aug 30, 2018Updated 7 years ago
- ☆13Aug 11, 2020Updated 5 years ago
- BPStegano is a steganography tool built using Python 3. It uses AES-128 encryption a custom LSB random pixel algorithm hiding to hide raw…☆26Feb 22, 2021Updated 5 years ago
- This is the repository for a bash learning project☆10Oct 20, 2020Updated 5 years ago
- Ambulance!☆12Nov 13, 2015Updated 10 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Shell scripts for decompiling and analyzing binary files through the retdec.com REST API.☆12Jun 17, 2018Updated 7 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 7 years ago
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- CLI to extract a Switch's SSL certificate from PRODINFO☆19Oct 10, 2020Updated 5 years ago
- WORDLE for DOS, written in assembly☆12Jan 4, 2023Updated 3 years ago
- Maciej Sypien personal dotfiles for macOS, Linux (ubuntu)☆11Jan 25, 2026Updated last month
- Simple reporting plugin for binary ninja☆16Oct 28, 2018Updated 7 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- TLS Client Certificate Authentication and its Privacy Implications☆15Jul 25, 2017Updated 8 years ago
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- Gough-stewart platform developed for replicating anatomical surgical environments for the da Vinci surgical robot.☆15Feb 1, 2018Updated 8 years ago
- ☆19Dec 20, 2019Updated 6 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- A small research about finding stupid C-string related bugs☆13Jun 29, 2022Updated 3 years ago
- CherryTree OSCP methodology template☆15Dec 10, 2018Updated 7 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Apr 5, 2020Updated 5 years ago
- slides and materials for CS4803UWS at Georgia Tech, summer 2013, "UNIX Weapons School"☆25Aug 19, 2013Updated 12 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 7 years ago
- collectd☆11Feb 3, 2020Updated 6 years ago