mpgn / astudiaethLinks
Master CSI
☆31Updated this week
Alternatives and similar repositories for astudiaeth
Users that are interested in astudiaeth are comparing it to the libraries listed below
Sorting:
- Epreuves de sélection de la TeamFR pour l'ECSC 2019.☆163Updated 2 years ago
- Security, hacking conferences (list)☆529Updated last month
- Many-Time Pad Interactive☆174Updated last year
- Web calendar in ELM☆22Updated 4 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,995Updated 4 months ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,261Updated 2 years ago
- ☆692Updated 3 months ago
- A Course on Intermediate Level Linux Exploitation☆1,001Updated 4 years ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,198Updated 2 weeks ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,109Updated 3 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆526Updated 4 years ago
- ☆12Updated last year
- Challenges for Binary Exploitation Workshop☆617Updated 2 years ago
- CTF Field Guide☆1,361Updated 8 months ago
- The best tool for finding one gadget RCE in libc.so.6☆2,198Updated 2 weeks ago
- Exercises for learning Reverse Engineering and Exploitation.☆387Updated 6 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆569Updated 2 months ago
- ☆232Updated 6 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,975Updated last month
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,790Updated 6 years ago
- Tutorials for getting started with Pwntools☆1,489Updated 9 months ago
- A collection of resources for linux reverse engineering☆2,050Updated 3 years ago
- A tool to analyze multi-byte xor cipher☆1,440Updated 2 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆699Updated 9 months ago
- Some helpful preload libraries for pwning stuff.☆1,620Updated 2 months ago
- A sorted and updated list of security wargame sites.☆1,033Updated last week
- Tips, Tricks, and Suggestions for Running a CTF☆390Updated 2 years ago
- The 'exploitable' GDB plugin☆736Updated 2 years ago
- Build a database of libc offsets to simplify exploitation☆1,799Updated 9 months ago
- Forge your own CTF☆46Updated 4 years ago