CSAW CTF 2016 Finals
☆13Dec 1, 2016Updated 9 years ago
Alternatives and similar repositories for CSAW-CTF-2016-Finals
Users that are interested in CSAW-CTF-2016-Finals are comparing it to the libraries listed below
Sorting:
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead☆16Aug 2, 2015Updated 10 years ago
- ☆20Feb 28, 2018Updated 8 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Hide information content into busy areas of images, optimally☆63Mar 21, 2017Updated 8 years ago
- Simulations of Stop-and-Wait, Go-Back-N, Selective-Repeat☆27Sep 10, 2015Updated 10 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 6 years ago
- Next Gen Nagios UI☆17Jul 14, 2014Updated 11 years ago
- Download the latest Palo Alto Networks content update☆13Aug 23, 2018Updated 7 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Repo for CSAW CTF 2018 Quals challenges☆38Sep 17, 2018Updated 7 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 6 years ago
- 2019年刚学习编程3个月写的一个项目,当时写了半个暑假,各种中间件/新概念的冲击,但是还是写完了我这个博客项目(前台+后台),写的初衷是为了让我复习一下java-web的知识和spring-boot☆10Oct 8, 2019Updated 6 years ago
- Authy integration javascripts☆17Jun 17, 2013Updated 12 years ago
- Go语言爆破Sha256前四字符☆10May 21, 2019Updated 6 years ago
- grok patterns for Asterisk log file☆13Oct 15, 2012Updated 13 years ago
- It's one better☆11Jan 1, 2026Updated 2 months ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- Rust 官方文档翻译(Chinese translation of Rust official documentation)☆16May 14, 2015Updated 10 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Implementation of Single Page Application (SPA) Proxy security pattern as introduced in the blog post https://medium.facilelogin.com/thir…☆12Dec 18, 2017Updated 8 years ago
- The UKWA Heritrix3 custom modules and Docker builder.☆11Dec 2, 2024Updated last year
- Packer.io Scripts to build the SIFT VM(s)☆10Aug 29, 2020Updated 5 years ago
- Automatically updated CSV of Bitcoin Historical Price Data from GDAX. Updates every 30 minutes.☆13Sep 11, 2018Updated 7 years ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- Disables guest mode by forcing users to login to access the regular web interface. Now integrated into OctoPrint. Provided for historical…☆12Dec 12, 2018Updated 7 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago