ouspg / CompSec
Exercises for (legacy) Computer Security course in the University of Oulu
☆44Updated last year
Alternatives and similar repositories for CompSec:
Users that are interested in CompSec are comparing it to the libraries listed below
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 7 months ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 7 years ago
- ☆20Updated 3 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 2 years ago
- Simple vulnerability scanning framework☆50Updated 8 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆67Updated 3 years ago
- Dockerfiles for (un)popular fuzzers!☆29Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 8 years ago
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- ☆87Updated 2 years ago
- ☆16Updated 6 years ago
- Embedded AppSec Best Practices☆40Updated last year
- Slides, papers, etc☆31Updated last year
- Fuzz testing framework for network protocols.☆17Updated 4 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- python and honggfuzz☆25Updated 4 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Updated 7 years ago
- CSAW Embedded Security Challenge 2019☆33Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago