open-education-hub / binary-security
Security Summer School, Binary track
☆27Updated 6 months ago
Alternatives and similar repositories for binary-security:
Users that are interested in binary-security are comparing it to the libraries listed below
- Security Summer School, Web track☆24Updated 5 months ago
- Security Summer School: Security Essentials Track☆18Updated 5 months ago
- Teaching resources (OER) for Operating Systems☆64Updated 8 months ago
- ☆148Updated 2 weeks ago
- BINSEC binary-level open-source platform☆329Updated 5 months ago
- Set of pre-generated pwn.college challenges☆62Updated last year
- Kernel development & exploitation practice environment.☆218Updated last year
- Old and new CTFs about Linux kernel exploitation.☆52Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- An index page to all of the homework from the university on this account.☆11Updated last year
- ☆62Updated 10 months ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 2 years ago
- RE / Binary Exploitation Resources☆67Updated 7 years ago
- ☆27Updated 2 years ago
- CVE-2013-2028 python exploit☆14Updated 4 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆29Updated 3 years ago
- A grammar-based custom mutator for AFL++☆240Updated 6 months ago
- Generation-based, context-free grammar fuzzer.☆48Updated 2 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆149Updated 11 months ago
- A set of vulnerable C code snippets (with mapped CVEs)☆69Updated 6 months ago
- Exploitation and Mitigation Slides☆127Updated 7 months ago
- A vulnerable C program for testing fuzzers.☆192Updated 2 years ago
- ☆76Updated last year
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆80Updated 2 months ago
- Slides from our technical talks☆28Updated 2 months ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆24Updated 2 years ago
- ☆129Updated 3 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆148Updated 3 years ago
- Cheat sheet of binary protections flags☆23Updated 4 years ago