my talk on defcon26
☆20Sep 29, 2018Updated 7 years ago
Alternatives and similar repositories for defcon26
Users that are interested in defcon26 are comparing it to the libraries listed below
Sorting:
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- ☆15May 23, 2019Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules☆48Oct 25, 2020Updated 5 years ago
- A simple web application to learn about Cross-Site Scripting (XSS)☆23Oct 1, 2020Updated 5 years ago
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- Tool for CVE-2018-16323☆82Jan 17, 2019Updated 7 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- a management tool☆35Dec 8, 2022Updated 3 years ago
- ☆10Nov 4, 2021Updated 4 years ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆10Jan 31, 2019Updated 7 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Powerful Firewall For EOS Contract☆42Aug 2, 2019Updated 6 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- 🎥 A list of awesome engineering streams! ARCHIVED in favor of https://github.com/bnb/awesome-developer-streams☆10Dec 24, 2019Updated 6 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- 《安全档案》信息安全技术期刊☆11Mar 30, 2019Updated 6 years ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- 对一些开源cms官网的更新,github commit进行监控的工具☆11Dec 27, 2018Updated 7 years ago
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- ☆12Sep 27, 2018Updated 7 years ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- A React Blog Powered by the Cosmic JS GraphQL API☆10Jan 22, 2018Updated 8 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- A tool to convert smali codes to java-like codes☆23May 6, 2015Updated 10 years ago
- CLIP OS Manifest☆11Nov 4, 2020Updated 5 years ago
- 作为博客☆11Apr 30, 2020Updated 5 years ago
- ☆10Jul 21, 2022Updated 3 years ago
- Ontology Triones Service Node security checklist(本体北斗共识集群安全执行指南)☆47Dec 12, 2021Updated 4 years ago
- InfoSecIITR website☆11Nov 15, 2025Updated 3 months ago
- ☆12May 22, 2018Updated 7 years ago
- 机器学习等算法学习笔记☆10Feb 22, 2020Updated 6 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago