justinhe16 / Useful-CS-LinksLinks
A README.md compilation of useful links for CS students. These range from building cool projects, recruiting, and other random CS-related articles/tools/platforms.
☆11Updated 7 years ago
Alternatives and similar repositories for Useful-CS-Links
Users that are interested in Useful-CS-Links are comparing it to the libraries listed below
Sorting:
- CDDC Exploitation Framework☆13Updated 2 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 10 years ago
- network security scripts and tips....☆14Updated 6 years ago
- Materials for the IAP 2018 Fundamentals of Exploitation course☆7Updated 7 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 9 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- OWASP ZSC API http://api.z3r0d4y.com/v2☆9Updated 8 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Updated 8 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- Writeups for different CTF challenges☆70Updated 4 months ago
- ☆17Updated 10 years ago
- Security Tool to detect arp poisoning attacks☆55Updated 7 years ago
- Puzzles, challenges, games, CTFs, and other entertainment via coding☆203Updated 4 years ago
- A simple web based tool for working with assembly / disassembly☆89Updated 8 months ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Ans to the FAQ: How do you self-learn information security?☆29Updated 7 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- ARP Poisoning Defense Scripts☆38Updated 7 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- a tool to determine the crypto/encoding algorithm used according to traces from its representation☆133Updated 4 years ago
- Here's a quick rundown of how I reversed the Casper API (https://casper.io)☆58Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Information Security News☆61Updated last year
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- VirusTotal tools☆91Updated 4 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- python web scraping☆9Updated 10 years ago