lojikil / kyoto-go-nihilism
A quick and dirty Golang security talk
☆27Updated 4 years ago
Alternatives and similar repositories for kyoto-go-nihilism:
Users that are interested in kyoto-go-nihilism are comparing it to the libraries listed below
- Go Taint CHeck Analyser☆44Updated 5 years ago
- The Dirty Pipe Vulnerability☆47Updated 2 years ago
- Static code analysis tool to find unsafe usages in Go packages and their dependencies☆42Updated 4 years ago
- Trivy based vulnerability management service☆55Updated 2 months ago
- repository to research & share the "machine learning & security" articles☆20Updated 6 years ago
- webfuck chrome extension☆18Updated 8 years ago
- Some stuff for CTF.☆11Updated 5 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- TypeScript Scenario-Based Web Application Fuzzing Framework☆65Updated 3 years ago
- API client for crt.sh☆41Updated 4 years ago
- Fuzzing Go crypto☆75Updated 5 years ago
- ☆19Updated 6 months ago
- For training of "Exploitation Fundamentals"☆49Updated 4 years ago
- GCP Secret Management Demo Tool☆13Updated 6 years ago
- ☆10Updated 8 years ago
- Detect patterns of bad behavior in function calls☆25Updated 4 years ago
- Underconstrained symbolic execution for cryptography verification☆18Updated 3 years ago
- The full set of files that supported TSG CTF challenges☆30Updated 5 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 3 years ago
- ☆11Updated 3 years ago
- QL Workshop☆16Updated 5 years ago
- 脆弱性報奨金制度に関する詳細文書を保管するレポジトリです☆34Updated last month
- Kubernetes CTF☆43Updated 4 years ago
- ARM Exploit 開発のためのトレーニングリポジトリ☆19Updated 4 years ago
- 高対話型ハニーポット☆27Updated 5 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Updated 4 years ago
- Lazy python wrapper of KLEE for solving CTF challenges☆65Updated 4 years ago
- Archive of akictf Challenges☆57Updated 5 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago