sduverger / secosLinks
educational x86 kernel
☆29Updated 4 years ago
Alternatives and similar repositories for secos
Users that are interested in secos are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable IoT Device☆213Updated last year
- Here are the challenges (including sources) of the GreHack CTF.☆107Updated last year
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- Challenges for INShAck 2018☆25Updated 6 years ago
- A multi-tenant network sandbox for security challenges☆85Updated last year
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- RSHack - Tool for RSA CTF's challenges☆100Updated 7 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆137Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆322Updated 2 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 8 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Pour nos write ups de CTF ou Rhacklettes party☆23Updated 6 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- A Centralized Wiki for CTF Organization☆11Updated 4 years ago
- Fork of mona.py with x64dbg support☆108Updated 3 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆78Updated last month
- ☆50Updated 3 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Updated 7 years ago
- Vulnerability examples.☆412Updated last year
- a pstree mod that prints other helpful information and with added functionality☆25Updated 5 years ago
- OSEE Preparation☆191Updated 6 years ago
- Ejercicios y teoría sobre explotación de binarios y búsqueda de vulnerabilidades.☆45Updated 6 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆94Updated 3 years ago
- Where CTFs happen☆82Updated last year
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated last month
- Tools I wrote for personal use in C, Python, Powershell, Bash, ...☆46Updated 7 years ago