lojikil / kyoto-go-nihilismLinks
A quick and dirty Golang security talk
☆27Updated 5 years ago
Alternatives and similar repositories for kyoto-go-nihilism
Users that are interested in kyoto-go-nihilism are comparing it to the libraries listed below
Sorting:
- A set of vulnerable Golang programs☆177Updated 2 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Updated 6 years ago
- Detect patterns of bad behavior in function calls☆26Updated 5 years ago
- QL Workshop☆16Updated 5 years ago
- Go Taint CHeck Analyser☆43Updated 6 years ago
- ☆72Updated 5 years ago
- Static code analysis tool to find unsafe usages in Go packages and their dependencies☆44Updated 4 years ago
- ☆170Updated 4 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 4 years ago
- ☆13Updated 5 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- A project to run fuzzing jobs at scale with Kubernetes.☆148Updated 4 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Updated 5 years ago
- repository to research & share the "machine learning & security" articles☆20Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 5 years ago
- Distributed filesystem scanner☆131Updated 6 years ago
- 高対話型ハニーポット☆27Updated 6 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- Some stuff for CTF.☆11Updated 5 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- Setup for a pwning VM☆61Updated 6 years ago
- An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like t…☆95Updated last year
- ☆30Updated 4 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 3 years ago
- This is a sample approach of data analysis in security scene.☆18Updated 6 years ago
- A DFIR tool to collect artifacts on macOS☆55Updated 5 years ago
- ☆20Updated 11 months ago