solar-wine / writeupsLinks
Hack-A-Sat Qualifiers Writeups
☆250Updated 2 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- ASLR bypass without infoleak☆161Updated 3 years ago
- ☆123Updated last year
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆156Updated 6 months ago
- Hack-a-Sat 4 2023 - Finals Public Release☆48Updated last year
- An automatic Blind ROP exploitation tool☆204Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆113Updated last year
- Comprehensive toolkit for Ghidra headless.☆357Updated last month
- ☆197Updated 9 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- A list of lists involving IoT in general☆144Updated 3 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆218Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- A tool for firmware cartography☆152Updated this week
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆84Updated 5 months ago
- ☆320Updated 11 months ago
- ☆203Updated 7 months ago
- ☆99Updated 4 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆57Updated this week
- ☆29Updated 2 years ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆46Updated this week
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆256Updated 6 months ago
- Write fuzzer with rust☆204Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆192Updated 2 weeks ago
- list of organizations offering vulnerability research/reverse engineering jobs☆64Updated 2 months ago
- ☆77Updated 11 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆420Updated 3 years ago
- ☆47Updated 3 years ago