Exercises for (legacy) Computer Security course in the University of Oulu
☆46Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for CompSec
Users that are interested in CompSec are comparing it to the libraries listed below
Sorting:
- ECED440 Computer Security☆11Updated this week
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Nov 27, 2018Updated 7 years ago
- Command and Control server on Slack☆29Jan 30, 2019Updated 7 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- A script to enumerate valid usernames based on the requests response times.☆23May 3, 2022Updated 3 years ago
- RHme3 CTF writeups☆21Aug 6, 2022Updated 3 years ago
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆26Jul 9, 2024Updated last year
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last month
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆77Jan 30, 2020Updated 6 years ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆45Sep 20, 2023Updated 2 years ago
- Hardware Security Labs☆31May 3, 2017Updated 8 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- CANoolder: CAN to 3.3V logic level interface. Dumb. Cheap. Simple. Pick 3.☆15Feb 14, 2018Updated 8 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- Dev board for RP2040 and FUSB302B☆12Dec 20, 2023Updated 2 years ago
- 这是一个获取任意切换libc版本和源码级别调试能力的仓库☆12Mar 13, 2020Updated 6 years ago
- Infects PE files with a shellcode☆22Oct 20, 2018Updated 7 years ago
- Run shellcode through InnoSetup code engine.☆74Jun 22, 2023Updated 2 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- A simple library to interface with Gwiot 7941E RFID reader☆11Nov 2, 2020Updated 5 years ago
- The Amazing $1 Microcontrollers☆13May 14, 2019Updated 6 years ago
- One POV Display to rule them all!☆14Sep 29, 2019Updated 6 years ago
- Embedded facial recognition system involving PYNQ board, Webcam, and HDMI output.☆11May 10, 2018Updated 7 years ago
- Exploits for various CVEs☆11Mar 19, 2022Updated 4 years ago
- ☆21Nov 6, 2018Updated 7 years ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- ☆52Dec 28, 2023Updated 2 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- ☆10Aug 8, 2020Updated 5 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- Upload "Oshwi" Badge for OshwDem 2017 a Coruña☆10May 26, 2018Updated 7 years ago
- PCB ruler with different foot prints ,SMD proto-typing area, tables, various AWG size holes and inches and cm scale.☆12Dec 31, 2015Updated 10 years ago
- Arduino sketches for the STM32WB-based Katydid (aka Connected Motion Sense) wearable IoT platform☆13Sep 17, 2021Updated 4 years ago
- ☆11May 10, 2019Updated 6 years ago
- Industrial Hacking Simulator☆27Feb 21, 2026Updated 3 weeks ago