nsec / nsec-badgeLinks
Software from the NorthSec badge
☆58Updated 4 months ago
Alternatives and similar repositories for nsec-badge
Users that are interested in nsec-badge are comparing it to the libraries listed below
Sorting:
- Advanced: Bluetooth low energy capture the flag☆63Updated 2 years ago
- RHme+ 2015 challenge☆115Updated 9 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆90Updated 7 years ago
- A thorough library database to assist with binary exploitation tasks.☆195Updated 3 years ago
- DarkNight theme for Ghidra☆127Updated 5 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆57Updated 8 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆160Updated 5 years ago
- Stuff from CTF contests☆39Updated 6 years ago
- Rhme2 challenge (2016)☆328Updated 8 years ago
- ☆182Updated 5 years ago
- ☆233Updated 2 years ago
- Binary Golf Library☆61Updated 4 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- ☆220Updated 2 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- Content related to hardware hacking☆54Updated 6 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated last month
- A U-Boot hacking toolkit for security researchers and tinkerers☆274Updated 2 years ago
- ☆136Updated 4 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆294Updated last year
- ☆31Updated 4 years ago
- ☆111Updated 6 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆107Updated last year
- ☆21Updated 4 years ago
- Source code from some of the challenges that were presented at http://montrehack.ca☆35Updated 9 months ago
- Make your Ghidra Lazy!☆154Updated 5 years ago
- Binary Protocol Differ☆118Updated 5 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 3 years ago
- Ghidra Function ID dataset repository☆193Updated 5 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆53Updated 8 months ago