osirislab / CSAW-CTF-2016-FinalsView external linksLinks
CSAW CTF 2016 Finals
☆13Dec 1, 2016Updated 9 years ago
Alternatives and similar repositories for CSAW-CTF-2016-Finals
Users that are interested in CSAW-CTF-2016-Finals are comparing it to the libraries listed below
Sorting:
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Programmatic disassembly and patching☆69Dec 30, 2016Updated 9 years ago
- V1.0☆15Aug 8, 2016Updated 9 years ago
- Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead☆16Aug 2, 2015Updated 10 years ago
- ☆20Feb 28, 2018Updated 7 years ago
- Hide information content into busy areas of images, optimally☆63Mar 21, 2017Updated 8 years ago
- Cream of the Crop Pwning Challenges☆32Feb 1, 2020Updated 6 years ago
- Simulations of Stop-and-Wait, Go-Back-N, Selective-Repeat☆27Sep 10, 2015Updated 10 years ago
- ☆93Jul 30, 2021Updated 4 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 6 years ago
- Download the latest Palo Alto Networks content update☆13Aug 23, 2018Updated 7 years ago
- Next Gen Nagios UI☆17Jul 14, 2014Updated 11 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Repo for CSAW CTF 2018 Quals challenges☆38Sep 17, 2018Updated 7 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- The UKWA Heritrix3 custom modules and Docker builder.☆11Dec 2, 2024Updated last year
- Authy integration javascripts☆17Jun 17, 2013Updated 12 years ago
- Go语言爆破Sha256前四字符☆10May 21, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Command-line option parser.☆46Sep 11, 2016Updated 9 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 6 years ago
- a primary exploration of graphql☆10Jan 6, 2023Updated 3 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Disables guest mode by forcing users to login to access the regular web interface. Now integrated into OctoPrint. Provided for historical…☆12Dec 12, 2018Updated 7 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Rust 官方文档翻译(Chinese translation of Rust official documentation)☆16May 14, 2015Updated 10 years ago
- Frontend of 积薪 firewood.news☆10May 12, 2024Updated last year
- MMORPG server emulator☆12Aug 26, 2018Updated 7 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago