sigpwny / shibboleth-link
Docker container that creates an easy authentication system with UIUC's Shibboleth Identity Provider
☆9Updated 2 months ago
Alternatives and similar repositories for shibboleth-link:
Users that are interested in shibboleth-link are comparing it to the libraries listed below
- The website for ACM@UIUC☆11Updated last week
- A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in…☆78Updated 3 years ago
- Like Russian roulette, but for your kernel.☆14Updated 4 years ago
- A tool to easily archive CTFd sites to GitHub Pages☆32Updated 2 months ago
- ☆7Updated last year
- NSA Codebreaker Challenge 2021 Write-Ups☆56Updated 3 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆79Updated 4 years ago
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆43Updated 9 months ago
- PoC for our attacks on MEGA.☆27Updated 2 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆138Updated 6 years ago
- Materials from the DEF CON 30 talk on PACMAN☆32Updated 2 years ago
- Published problems and writeups from the Information & Systems Security Society's CTF contests☆6Updated 6 months ago
- Infer internal state of Mersenne Twister from truncated output☆76Updated 2 years ago
- ☆9Updated 3 years ago
- A full English version of the popular ctf-wiki☆92Updated 9 months ago
- If I solve a CTF challenge and do a writeup, it goes here.☆10Updated 4 months ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated 10 months ago
- Jupyter Plugin for Cutter☆26Updated 5 years ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆68Updated 3 years ago
- Slides from our technical talks☆29Updated 6 months ago
- Use md5-collisions to make evil executables looking like a good one.☆29Updated 5 years ago
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆80Updated last year
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Updated 3 years ago
- Quick and dirty spectrum analyzer and audio filter for Windows using the sounddevice library. Currently is able to be used to filter out …☆10Updated 4 years ago
- A binary hardening system☆107Updated last year
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Updated 2 years ago
- Challenge source code and deployment scripts for UIUCTF 2022☆32Updated 2 years ago
- ☆35Updated last year
- Corrupted files generator. Random bits flipper.☆24Updated last year
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆41Updated last year