sigpwny / sigpwny-shibboleth-auth
Docker container that creates an easy authentication system with UIUC's Shibboleth Identity Provider
☆7Updated last week
Related projects: ⓘ
- Course selection made easy☆19Updated 10 months ago
- An reddit bot that displays useful GPA/course information in response to reddit topics/comments☆11Updated 3 years ago
- Discord bot to fetch UIUC classes.☆19Updated 8 months ago
- Like Russian roulette, but for your kernel.☆12Updated 3 years ago
- GIF displaying its own MD5 (hashquine)☆75Updated 4 years ago
- encrypted-linux-kernel-modules☆11Updated 3 years ago
- Infer internal state of Mersenne Twister from truncated output☆69Updated 2 years ago
- A tool to easily archive CTFd sites to GitHub Pages☆30Updated this week
- A possible method for faster-than-light communication☆43Updated 7 months ago
- Some guides about general topics on information security☆11Updated 5 years ago
- ☆77Updated 3 years ago
- Pysh: the python shell☆19Updated 7 years ago
- A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in…☆76Updated 2 years ago
- A ImHex plugin to ask the almighty Oracle (OpenAI's Davinci AI) for help identifying file formats☆17Updated last year
- The website for ACM@UIUC☆10Updated last week
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆43Updated last year
- Bleichenbachers "Million message attack" on RSA in Python☆26Updated 3 years ago
- How fast can we brute force a 64-bit comparison?☆52Updated 4 years ago
- Fork Free Fail Repeat☆46Updated 3 years ago
- A repository teaching bss/data segment exploitation techniques.☆12Updated 5 years ago
- JavaScript library for misspelling and modifying text to make it seem like it was written by a stereotypical "bimbo", or to make the text…☆9Updated last year
- A repository trying to collect things related to LLL☆69Updated last week
- A binary hardening system☆96Updated 11 months ago
- Where CTFs happen☆76Updated 3 months ago
- ☆92Updated 11 months ago
- An IOKit kext designed for microarchitectural security research on M1☆26Updated last year
- Proof-of-concept for Spook.js☆69Updated 3 years ago
- 'Ike: A binary exploitation and reversing handbook.☆66Updated last year
- ☆10Updated 3 years ago
- redpwn's challenge deployment system☆23Updated 8 months ago