solar-wine / writeups
Hack-A-Sat Qualifiers Writeups
☆247Updated 2 years ago
Alternatives and similar repositories for writeups:
Users that are interested in writeups are comparing it to the libraries listed below
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆145Updated 3 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆109Updated 11 months ago
- ASLR bypass without infoleak☆159Updated 3 years ago
- ☆122Updated last year
- ☆315Updated 8 months ago
- An automatic Blind ROP exploitation tool☆196Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆164Updated 11 months ago
- A tool for firmware cartography☆145Updated 2 months ago
- Hack-a-Sat 4 2023 - Finals Public Release☆42Updated last year
- VSS Hardware Hacking Wiki and Blog Entries☆238Updated last year
- ☆88Updated last month
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆210Updated last year
- Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providi…☆154Updated 6 months ago
- ☆77Updated 8 months ago
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 3 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆61Updated 7 months ago
- ☆43Updated 3 years ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆41Updated last month
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆78Updated 2 months ago
- Slides and videos from my public speeches / conferences☆71Updated 2 months ago
- Damn Vulnerable IoT Device☆199Updated last year
- Bluetooth Security Assessment Methodology☆112Updated 9 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆158Updated 5 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated last year
- ☆169Updated last month
- RE / Binary Exploitation Resources☆70Updated 7 years ago