lblopes / unixprogrammingLinks
Some C templates/examples for UNIX programming
☆11Updated last year
Alternatives and similar repositories for unixprogramming
Users that are interested in unixprogramming are comparing it to the libraries listed below
Sorting:
- Challenges and official solutions for SINF CTF 2020 (companion CTF of SINF, for students, which I organized by myself)☆13Updated 4 years ago
- Team Page☆15Updated 6 years ago
- Damn Vulnerable IoT Device☆212Updated last year
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Updated last year
- code and manual for the defcon 29 electronic Tor badge☆24Updated 3 years ago
- A simple Python 3 script to perform Common Modulus attacks on RSA☆40Updated 5 years ago
- Advanced: Bluetooth low energy capture the flag☆62Updated 2 years ago
- Simple Repo for me to note down useful techniques, scripts and tools.☆20Updated 7 years ago
- writeups for Capture The Flag Competitions☆16Updated 3 years ago
- Multipurpose Breakout for the FT232H☆94Updated last year
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- OWASP Foundation Web Respository☆16Updated 3 weeks ago
- A CTF platform used in IceCTF 2016☆68Updated 5 years ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆319Updated last year
- Desktop variant of OWASP Threat Dragon☆77Updated 4 years ago
- T-Watch 2020 v1 library for ESP32☆18Updated 3 years ago
- A tool written in both bash and python to parse doc/ drive links and collect secrets in those :)☆18Updated 3 years ago
- OWASP IoT Security Verification Standard (ISVS)☆144Updated 2 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆71Updated 11 months ago
- YesWeHack Api Extension for Burp☆90Updated last year
- Convert rubber ducky scripts to arduino compatible code☆32Updated 8 years ago
- Linux SBC featuring two wifi radios, masquerading as a USB charger.☆175Updated 2 years ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆84Updated 2 years ago
- OWASP IoT Top 10 2018 Mapping Project☆19Updated 5 years ago
- Hardware Hacking Cheatsheet infograph☆154Updated last year
- ☆25Updated 5 months ago
- ☆30Updated 4 years ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- Hash identification program.☆154Updated 3 years ago
- Been there, done that, got the t-shirt!☆11Updated 4 years ago