sduverger / secosLinks
educational x86 kernel
☆29Updated 5 years ago
Alternatives and similar repositories for secos
Users that are interested in secos are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable IoT Device☆214Updated last year
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆107Updated last year
- RSHack - Tool for RSA CTF's challenges☆100Updated 7 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- A multi-tenant network sandbox for security challenges☆86Updated last year
- Reverse engineering challenges☆52Updated 6 years ago
- Challenges for INShAck 2018☆25Updated 6 years ago
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆117Updated 4 years ago
- Pour nos write ups de CTF ou Rhacklettes party☆23Updated 6 years ago
- FAUST Gameserver for attack-defense CTFs☆103Updated 2 months ago
- ☆182Updated 6 years ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆88Updated 4 years ago
- Tools I wrote for personal use in C, Python, Powershell, Bash, ...☆46Updated 7 years ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆23Updated 7 years ago
- ☆53Updated 2 years ago
- Vulnerability examples.☆413Updated 2 weeks ago
- Different writeups and solutions of all CTF Contests that we've played!☆14Updated 6 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆22Updated 5 years ago
- Ejercicios y teoría sobre explotación de binarios y búsqueda de vulnerabilidades.☆46Updated 6 years ago
- Anti-reverse Compilation☆33Updated 4 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆141Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- Binary Golf Library☆61Updated 4 years ago
- A cheat sheet for attacking SQLite via SQLi☆102Updated 9 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Updated 8 years ago
- CTFd Dump - When you want to have an offline copy of a CTF.☆52Updated 8 months ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆105Updated 5 years ago