sduverger / secos
educational x86 kernel
☆28Updated 3 years ago
Alternatives and similar repositories for secos:
Users that are interested in secos are comparing it to the libraries listed below
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆58Updated 3 months ago
- Damn Vulnerable IoT Device☆192Updated 11 months ago
- ☆43Updated 2 years ago
- ELF patching library in Python☆24Updated 3 years ago
- Tools I wrote for personal use in C, Python, Powershell, Bash, ...☆44Updated 6 years ago
- Anti-reverse Compilation☆32Updated 3 years ago
- Binary Golf Library☆62Updated 3 years ago
- Challenges for INShAck 2018☆25Updated 5 years ago
- esoteric☆51Updated 4 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆100Updated 8 months ago
- Web interface to explore Suricata EVE outputs☆48Updated last month
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆44Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆107Updated 2 months ago
- RE / Binary Exploitation Resources☆67Updated 7 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Cheat sheet of binary protections flags☆23Updated 4 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 2 months ago
- A multi-tenant network sandbox for security challenges☆79Updated last month
- Scapy hands-on at #GreHack17☆16Updated 7 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- ☆59Updated 6 months ago
- Where CTFs happen☆80Updated 7 months ago
- crypto-condor is a Python library for compliance testing of implementations of cryptographic primitives☆18Updated 3 weeks ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated 11 months ago
- Markov-chains for linguistically-correct password cracking☆62Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆143Updated 2 years ago
- European Cyber Security Challenge Gameboard☆28Updated 2 years ago