lojikil / kyoto-go-nihilismLinks
A quick and dirty Golang security talk
☆27Updated 5 years ago
Alternatives and similar repositories for kyoto-go-nihilism
Users that are interested in kyoto-go-nihilism are comparing it to the libraries listed below
Sorting:
- A set of vulnerable Golang programs☆176Updated 2 years ago
- Go Taint CHeck Analyser☆43Updated 6 years ago
- ☆72Updated 5 years ago
- QL Workshop☆16Updated 5 years ago
- ☆21Updated 3 weeks ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- ☆170Updated 4 years ago
- Static code analysis tool to find unsafe usages in Go packages and their dependencies☆44Updated 5 years ago
- A project to run fuzzing jobs at scale with Kubernetes.☆148Updated 4 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 3 years ago
- repository to research & share the "machine learning & security" articles☆20Updated 7 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Updated 6 years ago
- Go API to interact with radare2☆33Updated last year
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Golang example code showing dangers with unsafe.Pointer usages☆51Updated 4 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- Setup for a pwning VM☆62Updated 6 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 4 years ago
- The Dirty Pipe Vulnerability☆46Updated 3 years ago
- A DFIR tool to collect artifacts on macOS☆55Updated 5 years ago
- A set of templates for different academic venues.☆28Updated 6 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- ☆13Updated 5 years ago
- Corpus for github.com/dvyukov/go-fuzz examples☆202Updated 4 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- TypeScript Scenario-Based Web Application Fuzzing Framework☆64Updated 3 years ago
- A fuzzing framework for network servers☆118Updated 6 years ago
- Underconstrained symbolic execution for cryptography verification☆19Updated 4 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 4 years ago