ouspg / CompSec
Exercises for (legacy) Computer Security course in the University of Oulu
☆44Updated last year
Alternatives and similar repositories for CompSec:
Users that are interested in CompSec are comparing it to the libraries listed below
- Content related to hardware hacking☆47Updated 5 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆20Updated 3 years ago
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆16Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 5 months ago
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- 802.15.4 Fuzzer☆21Updated 5 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 4 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- Files used for reproducing Fuzzware's experiments☆55Updated last year
- A framework for parsing binary data.☆16Updated 2 years ago
- An automated setup for fuzzing Redis w/ AFL++☆33Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆65Updated 3 years ago
- The Dumb Network Fuzzer☆19Updated last year
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆13Updated 4 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 2 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- python and honggfuzz☆25Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Read only mirror - No pull requests☆18Updated 3 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆29Updated last year
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- ☆27Updated 6 years ago
- LKRG bypass methods☆71Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago