osirislab / Hack-Night
Hack Night is an open weekly training session run by the OSIRIS lab.
β1,223Updated 7 months ago
Related projects β
Alternatives and complementary repositories for Hack-Night
- CTF Field Guideβ1,317Updated 2 months ago
- π¦ A curated list of the awesome resources about the Vulnerability Researchβ1,123Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016β1,609Updated 6 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015β1,983Updated 2 years ago
- A general collection of information, tools, and tips regarding CTFs and similar security competitionsβ1,747Updated 3 years ago
- Challenges for Binary Exploitation Workshopβ594Updated 2 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Developmentβ1,896Updated 2 years ago
- Course materials for Modern Binary Exploitation by RPISECβ5,472Updated 2 years ago
- A colleciton of CTF write-ups all using pwntoolsβ504Updated 8 years ago
- A Course on Intermediate Level Linux Exploitationβ986Updated 4 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2014β1,832Updated 8 years ago
- A curated list of awesome infosec courses and training resources.β5,192Updated 8 months ago
- πΎ a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnetsβ¦β161Updated this week
- CTF write-ups by Plaid Parliament of Pwningβ773Updated 5 months ago
- Great security list for fun and profitβ1,735Updated last year
- Tutorials for getting started with Pwntoolsβ1,403Updated last month
- A place to discuss potential projects for students of the ISIS Lab.β384Updated 11 years ago
- Course materials for Malware Analysis by RPISECβ3,762Updated 2 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2017β2,137Updated 5 years ago
- A list of Reverse Engineering articles, books, and papersβ2,341Updated last year
- An in depth tutorial on how to do binary exploitationβ450Updated 6 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice onβ¦β5,332Updated 7 months ago
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with otheβ¦β3,463Updated last year
- CTF write-ups from the VulnHub CTF Teamβ696Updated 6 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.β1,737Updated 5 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/β269Updated 4 years ago
- Linux Binary Exploitationβ1,302Updated 3 years ago
- A curated list of awesome reversing resourcesβ4,062Updated last year
- A collected list of awesome security talksβ4,040Updated 3 years ago
- Ctf solutions from p4 teamβ1,773Updated last month