legitbs / finals-2014View external linksLinks
finals-2014
☆20Nov 15, 2016Updated 9 years ago
Alternatives and similar repositories for finals-2014
Users that are interested in finals-2014 are comparing it to the libraries listed below
Sorting:
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- ☆24Dec 6, 2015Updated 10 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- ☆30May 23, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Jul 27, 2016Updated 9 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Educational tools for Binary Ninja☆20Jul 18, 2018Updated 7 years ago
- PE Bliss - Cross-Platform Portable Executable C++ Library☆16Jan 23, 2018Updated 8 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- websocket-protocol's implementation with multithread synchronization model in C++☆17Jul 23, 2017Updated 8 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆35Jun 15, 2017Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- MIR-Engine☆24Jul 6, 2017Updated 8 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- ☆10Nov 19, 2016Updated 9 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- enhanced spy++☆10Feb 7, 2014Updated 12 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 8 years ago