sduverger / secosLinks
educational x86 kernel
☆29Updated 4 years ago
Alternatives and similar repositories for secos
Users that are interested in secos are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable IoT Device☆216Updated last year
- A multi-tenant network sandbox for security challenges☆85Updated last year
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- Vulnerability examples.☆412Updated last year
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆78Updated 2 months ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Binary Golf Library☆61Updated 4 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆107Updated last year
- RSHack - Tool for RSA CTF's challenges☆100Updated 7 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 8 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- ☆51Updated 3 years ago
- ☆182Updated 5 years ago
- Tools I wrote for personal use in C, Python, Powershell, Bash, ...☆46Updated 7 years ago
- Fork of mona.py with x64dbg support☆109Updated 3 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- esoteric☆56Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- Where CTFs happen☆82Updated last year
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆114Updated 4 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- Scapy hands-on at #GreHack17☆16Updated 8 years ago
- Exploit Development, Reverse Engineering & Cryptography☆255Updated 4 months ago
- Challenges for INShAck 2018☆25Updated 6 years ago
- RE / Binary Exploitation Resources☆72Updated 8 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆159Updated 7 months ago