sduverger / secosLinks
educational x86 kernel
☆29Updated 5 years ago
Alternatives and similar repositories for secos
Users that are interested in secos are comparing it to the libraries listed below
Sorting:
- Here are the challenges (including sources) of the GreHack CTF.☆107Updated last year
- A multi-tenant network sandbox for security challenges☆86Updated last year
- Damn Vulnerable IoT Device☆214Updated last year
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Scapy hands-on at #GreHack17☆16Updated 8 years ago
- Vulnerability examples.☆413Updated 2 weeks ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- RSHack - Tool for RSA CTF's challenges☆100Updated 7 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆141Updated last year
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Binary Golf Library☆61Updated 4 years ago
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆117Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆88Updated 4 years ago
- Fork of mona.py with x64dbg support☆109Updated 3 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆80Updated 3 months ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆102Updated 6 years ago
- Tools I wrote for personal use in C, Python, Powershell, Bash, ...☆46Updated 7 years ago
- ☆182Updated 6 years ago
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆27Updated 6 years ago
- ☆19Updated 3 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Updated 8 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆267Updated 2 years ago
- RE / Binary Exploitation Resources☆74Updated 8 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- ☆51Updated 4 years ago
- This is a bash script to bypass 802.1x NAC☆100Updated 2 years ago