osuosl / cs312
Class site and slides for CS312 at Oregon State University
☆15Updated 8 years ago
Alternatives and similar repositories for cs312:
Users that are interested in cs312 are comparing it to the libraries listed below
- (AKA Marutukku) Backup of Assange's deniable cryptosystem.☆59Updated 13 years ago
- Advanced buffer overflow and memory corruption security challenges☆188Updated 2 years ago
- List of tools to assist in analyzing samples of ISFB/Gozi/Ursnif☆15Updated 5 years ago
- The diary of a n00b in the unfamiliar and terrifying venture into Capture-the-flag.☆12Updated 6 years ago
- A simple implant showcasing modern C++☆103Updated 4 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆183Updated 8 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆156Updated 8 months ago
- ☆28Updated last week
- ☆183Updated 2 years ago
- CITL's static analysis engine for native code artifacts☆20Updated 3 years ago
- Salvaging Static Analysis☆85Updated 5 years ago
- Decept Network Protocol Proxy☆274Updated 2 years ago
- Tools for utilizing the ANU Quantum Random Number Generator☆146Updated last year
- Cockroach is your primitive & immortal swiss army knife.☆47Updated 3 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆293Updated last week
- Teaching old shellcode new tricks☆203Updated 7 years ago
- Trigram database written in C++, suited for malware indexing☆125Updated 3 months ago
- Devestating and awesome Linux X86_64 ELF Virus☆226Updated 2 years ago
- A collection of tools for dealing with TrickBot☆198Updated 7 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆167Updated 12 years ago
- In service of posteriority☆43Updated 2 years ago
- ☆42Updated 6 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆150Updated 4 years ago
- A memorial site for Hackers and Infosec people who have passed☆130Updated last month
- ☆103Updated 5 years ago
- Source codes of malwares, stress tests etc. for computer.☆36Updated 4 years ago
- Format string exploitation helper☆45Updated 9 years ago
- An API for easily incorporating the D-Wave system as a sampler, either directly or through Leap's cloud-based hybrid samplers☆91Updated last month
- Mapping the NYC Infosec Community☆50Updated 3 months ago