solar-wine / writeups
Hack-A-Sat Qualifiers Writeups
☆250Updated 2 years ago
Alternatives and similar repositories for writeups:
Users that are interested in writeups are comparing it to the libraries listed below
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆152Updated 5 months ago
- Hack-a-Sat 4 2023 - Finals Public Release☆46Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- ☆123Updated last year
- ASLR bypass without infoleak☆160Updated 3 years ago
- ☆318Updated 10 months ago
- An automatic Blind ROP exploitation tool☆201Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆203Updated 5 months ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆213Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆110Updated last year
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆55Updated 3 years ago
- A full-featured open-source Wi-Fi fuzzer☆187Updated last month
- ☆45Updated 3 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆167Updated last year
- Bluetooth Security Assessment Methodology☆126Updated 11 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆418Updated 2 years ago
- ☆92Updated 3 months ago
- Write ups for Ph0wn CTF☆42Updated 4 months ago
- A tool for firmware cartography☆147Updated 4 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆251Updated 5 months ago
- Comprehensive toolkit for Ghidra headless.☆355Updated last week
- Damn Vulnerable IoT Device☆201Updated last year
- A list of lists involving IoT in general☆143Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated 3 weeks ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- Write fuzzer with rust☆203Updated last year