mpgn / astudiaethLinks
Master CSI
☆33Updated 6 months ago
Alternatives and similar repositories for astudiaeth
Users that are interested in astudiaeth are comparing it to the libraries listed below
Sorting:
- Epreuves de sélection de la TeamFR pour l'ECSC 2019.☆164Updated 2 years ago
- Many-Time Pad Interactive☆176Updated 2 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,116Updated 4 years ago
- Security, hacking conferences (list)☆548Updated 2 weeks ago
- ☆801Updated this week
- ☆238Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆591Updated this week
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,086Updated 11 months ago
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago
- Some security related notes☆461Updated 8 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆182Updated 11 years ago
- A collection of resources for linux reverse engineering☆2,067Updated 3 years ago
- Visualization of heap operations.☆617Updated last year
- Challenges for Binary Exploitation Workshop☆631Updated 3 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆670Updated last year
- The 'exploitable' GDB plugin☆747Updated 3 years ago
- A tool to analyze multi-byte xor cipher☆1,474Updated 8 months ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,816Updated 6 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,275Updated 3 years ago
- CTF write-ups by Plaid Parliament of Pwning☆806Updated last year
- Tips, Tricks, and Suggestions for Running a CTF☆399Updated 3 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆277Updated 5 years ago
- A Course on Intermediate Level Linux Exploitation☆1,009Updated 5 years ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,595Updated 4 years ago
- pwninit - automate starting binary exploit challenges☆1,062Updated 2 months ago
- attacking RSA via lattice reductions (LLL)☆830Updated 4 years ago
- An in depth tutorial on how to do binary exploitation☆455Updated 7 years ago
- CTF Field Guide☆1,410Updated last year
- A Course in Cryptanalysis☆151Updated last year
- ☆352Updated 10 years ago