krmaxwell / coding-entertainment
Puzzles, challenges, games, CTFs, and other entertainment via coding
☆200Updated 3 years ago
Related projects: ⓘ
- A weekly challenge where we share some code and you find a bug in it.☆69Updated 8 years ago
- A place to discuss potential projects for students of the ISIS Lab.☆384Updated 11 years ago
- Teach you a binary exploitation for great good.☆294Updated 5 years ago
- Capture the Flag: Web Edition https://stripe.com/blog/capture-the-flag-20☆276Updated 9 years ago
- ☆158Updated this week
- If you're launching a new application and have security in mind, this is a good starting point☆103Updated 8 years ago
- Resources for developers and security engineers to learn the ropes of application security☆98Updated 5 years ago
- ☆321Updated this week
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 7 years ago
- Cyber Security Base with F-Secure☆52Updated 5 years ago
- ☆55Updated this week
- This repository contains a docker container dedicated to reverse engineering☆82Updated 5 years ago
- ☆121Updated this week
- ☆276Updated 4 years ago
- Material related to my talks at various conferences on using Continuous Integration tools (Jenkins, Teamcity, Go, Hudson, CruiseControl) …☆118Updated 7 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 8 years ago
- Blogging about reversing "script kiddie" style malware.☆95Updated 9 years ago
- ☆76Updated this week
- ☆61Updated this week
- Live at http://extractdata.club☆167Updated 7 years ago
- A list of security blogs.☆56Updated 6 years ago
- Helper scripts to remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabili…☆51Updated 3 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆264Updated 3 years ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆204Updated 5 years ago
- ☆116Updated 8 years ago
- the main hackademic code repository☆317Updated 3 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 8 years ago
- A docker based honeypot.☆148Updated 9 years ago
- Files from my DEFCON CTF VM.☆267Updated 8 years ago