mpgn / astudiaethLinks
Master CSI
☆33Updated 6 months ago
Alternatives and similar repositories for astudiaeth
Users that are interested in astudiaeth are comparing it to the libraries listed below
Sorting:
- Epreuves de sélection de la TeamFR pour l'ECSC 2019.☆164Updated 2 years ago
- Security, hacking conferences (list)☆548Updated 2 weeks ago
- ☆238Updated last year
- ☆801Updated this week
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,275Updated 3 years ago
- Challenges for Binary Exploitation Workshop☆631Updated 3 years ago
- Python core of avatar²☆565Updated 10 months ago
- Rhme2 challenge (2016)☆330Updated 8 years ago
- A collection of pwn/CTF related utilities for Ghidra☆701Updated last year
- A series of tutorials about radare2 framework from https://www.megabeets.net☆529Updated 5 years ago
- Visualization of heap operations.☆617Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆717Updated last year
- Repository of various public white-box cryptographic implementations and their practical attacks.☆670Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,116Updated 4 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆591Updated last week
- The 'exploitable' GDB plugin☆747Updated 3 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆182Updated 11 years ago
- An archive of low-level CTF challenges developed over the years☆652Updated 4 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆523Updated last year
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago
- Many-Time Pad Interactive☆176Updated 2 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆399Updated 3 years ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,595Updated 4 years ago
- Some security related notes☆461Updated 8 years ago
- Using Intel's PIN tool to solve CTF problems☆508Updated 5 years ago
- A Course in Cryptanalysis☆149Updated last year
- A Course on Intermediate Level Linux Exploitation☆1,009Updated 5 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,086Updated 11 months ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆548Updated 4 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆833Updated 5 months ago