nkbai / defcon26View external linksLinks
my talk on defcon26
☆20Sep 29, 2018Updated 7 years ago
Alternatives and similar repositories for defcon26
Users that are interested in defcon26 are comparing it to the libraries listed below
Sorting:
- ☆15May 23, 2019Updated 6 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules☆48Oct 25, 2020Updated 5 years ago
- A simple web application to learn about Cross-Site Scripting (XSS)☆23Oct 1, 2020Updated 5 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- a management tool☆35Dec 8, 2022Updated 3 years ago
- Review everyday☆14May 30, 2020Updated 5 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Python Data Audit☆12Jul 24, 2020Updated 5 years ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆11Jan 31, 2019Updated 7 years ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Apr 3, 2023Updated 2 years ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- 《安全档案》信息安全技术期刊☆11Mar 30, 2019Updated 6 years ago
- CVE-2020-5902☆10Jul 11, 2020Updated 5 years ago
- google镜像☆10Apr 25, 2018Updated 7 years ago
- 作为博客☆11Apr 30, 2020Updated 5 years ago
- 对一些开源cms官网的更新,github commit进行监控的工具☆11Dec 27, 2018Updated 7 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 8 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- ☆11May 14, 2021Updated 4 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- ICNet in TensorFlow, Real-Time Segmentation☆10Aug 17, 2018Updated 7 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- A React Blog Powered by the Cosmic JS GraphQL API☆10Jan 22, 2018Updated 8 years ago
- 机器学习等算法学习笔记☆10Feb 22, 2020Updated 5 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.☆11Jul 21, 2022Updated 3 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 5 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- Mitigate CVE-2018-6389 WordPress load-scripts / load-styles attacks☆13Aug 30, 2018Updated 7 years ago
- ☆10Jul 21, 2022Updated 3 years ago
- CLIP OS Manifest☆11Nov 4, 2020Updated 5 years ago
- ☆12Sep 27, 2018Updated 7 years ago
- InfoSecIITR website☆11Nov 15, 2025Updated 2 months ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago