sduverger / secosLinks
educational x86 kernel
☆29Updated 5 years ago
Alternatives and similar repositories for secos
Users that are interested in secos are comparing it to the libraries listed below
Sorting:
- A multi-tenant network sandbox for security challenges☆86Updated last year
- Damn Vulnerable IoT Device☆214Updated last year
- Here are the challenges (including sources) of the GreHack CTF.☆107Updated last year
- RSHack - Tool for RSA CTF's challenges☆100Updated 7 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- Challenges for INShAck 2018☆25Updated 6 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Where CTFs happen☆82Updated last year
- Reverse engineering challenges☆52Updated 6 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆80Updated 3 months ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆88Updated 4 years ago
- Scapy hands-on at #GreHack17☆16Updated 8 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆267Updated 2 years ago
- Vulnerability examples.☆413Updated this week
- FAUST Gameserver for attack-defense CTFs☆102Updated 2 months ago
- Manage building and deploying exploitation challenges with ease☆59Updated 3 months ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆94Updated 3 years ago
- ☆209Updated 11 months ago
- Fork of mona.py with x64dbg support☆109Updated 3 years ago
- Web interface to explore Suricata EVE outputs☆84Updated last week
- ☆182Updated 6 years ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆72Updated 3 months ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆22Updated 5 years ago
- ☆238Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆139Updated last year
- Ejercicios y teoría sobre explotación de binarios y búsqueda de vulnerabilidades.☆46Updated 6 years ago