osirislab / Hack-NightLinks
Hack Night is an open weekly training session run by the OSIRIS lab.
☆1,264Updated last year
Alternatives and similar repositories for Hack-Night
Users that are interested in Hack-Night are comparing it to the libraries listed below
Sorting:
- CTF Field Guide☆1,403Updated last year
- A general collection of information, tools, and tips regarding CTFs and similar security competitions☆1,808Updated 4 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,295Updated 5 years ago
- Challenges for Binary Exploitation Workshop☆629Updated 3 years ago
- A Course on Intermediate Level Linux Exploitation☆1,007Updated 5 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,066Updated 3 years ago
- 👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets…☆219Updated last month
- Course materials for Malware Analysis by RPISEC☆3,979Updated 3 years ago
- An in depth tutorial on how to do binary exploitation☆452Updated 7 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,896Updated 4 years ago
- A place to discuss potential projects for students of the ISIS Lab.☆384Updated 12 years ago
- A collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.☆604Updated 11 months ago
- Some security related notes☆461Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,631Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2014☆1,856Updated 9 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,002Updated 3 years ago
- Linux Binary Exploitation☆1,351Updated 4 years ago
- Great security list for fun and profit☆1,840Updated 3 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆887Updated 6 years ago
- A collection of resources for linux reverse engineering☆2,067Updated 3 years ago
- A list of Reverse Engineering articles, books, and papers☆2,609Updated 2 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆277Updated 5 years ago
- A collected list of awesome security talks☆4,187Updated 4 years ago
- A colleciton of CTF write-ups all using pwntools☆520Updated 9 years ago
- Collection of free books, papers and articles related to CTF challenges.☆385Updated 6 years ago
- Stuff about it-security that might be good to know☆1,022Updated 2 years ago
- CTF write-ups by Plaid Parliament of Pwning☆800Updated last year
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆296Updated 9 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,272Updated 3 years ago
- 🔒 A collection of cheatsheets for various infosec tools and topics.☆1,363Updated 3 years ago