mitre-cyber-academy / 2023-ectf-insecure-exampleLinks
Insecure reference example for the 2023 Collegiate eCTF
☆18Updated 2 years ago
Alternatives and similar repositories for 2023-ectf-insecure-example
Users that are interested in 2023-ectf-insecure-example are comparing it to the libraries listed below
Sorting:
- Support tools for the MITRE 2023 eCTF☆15Updated 2 years ago
- Interactive ChipWhisperer tutorials using Jupyter notebooks.☆295Updated 5 months ago
- ☆327Updated last year
- Fuzzware's main repository. Start here to install.☆350Updated 2 months ago
- Insecure reference example for the 2022 Collegiate eCTF☆13Updated 3 years ago
- Main HALucinator branch☆46Updated last month
- Fuzzing Embedded Systems using Hardware Breakpoints☆188Updated last year
- Script for emulating Arm firmware in QEMU, including a binary for hooking functions for certain Tenda firmware versions that are not stra…☆31Updated 5 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆180Updated 3 years ago
- ☆108Updated last year
- ☆183Updated last year
- Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.☆207Updated 10 months ago
- A curated list of Capture The Signal CTF related stuff☆17Updated 3 years ago
- ☆164Updated 3 years ago
- Rhme2 challenge (2016)☆323Updated 8 years ago
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆42Updated 2 years ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆84Updated this week
- Infrastructure powering the pwn.college dojo☆385Updated last week
- Hack A Sat 2020 Qualifier Challenges☆102Updated 3 years ago
- Open source release of challenges and other code used in the Hack-A-Sat Qualifier in 2020.☆88Updated last year
- A list of resources (papers, books, talks, frameworks, tools) for understanding fuzzing for IoT/embedded devices.☆47Updated 3 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- Python core of avatar²☆558Updated 5 months ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆220Updated last year
- A set of vulnerable C code snippets (with mapped CVEs)☆79Updated last year
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Updated 5 years ago
- A fuzzing framework for Hexagon baseband firmware using QEMU system emulation.☆115Updated 3 months ago
- A Framework for fuzzing USB Drivers by Device Emulation☆124Updated 4 years ago
- A list of open source reverse engineering tools with a focus on binary analysis☆222Updated last year
- Materials from the DEF CON 30 talk on PACMAN☆34Updated 2 years ago