ouspg / CompSecLinks
Exercises for (legacy) Computer Security course in the University of Oulu
☆45Updated last year
Alternatives and similar repositories for CompSec
Users that are interested in CompSec are comparing it to the libraries listed below
Sorting:
- Presented hardware reverse engineering workshops since 2019☆61Updated 9 months ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Dockerfiles for (un)popular fuzzers!☆29Updated 5 years ago
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 2 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- python and honggfuzz☆25Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Embedded AppSec Best Practices☆41Updated last year
- The Zulu fuzzer☆125Updated 7 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆73Updated 4 years ago
- ☆20Updated 3 years ago
- Backwards program slice stitching for automatic CTF problem solving.☆52Updated 6 years ago
- Stuff from CTF contests☆39Updated 5 years ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Updated 6 years ago
- For code snippets and information☆41Updated 6 years ago
- ☆37Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- A pip wrapper around AFL.☆85Updated 4 years ago
- Improving side channel analysis techniques for CTF problems.☆13Updated 4 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Collection of images and examples to use with Shoggoth.☆19Updated 4 years ago