stuxnet999 / Forensics-WorkshopLinks
A set of 10 challenges for Forensics workshop, VIDYUT'19
☆14Updated 5 years ago
Alternatives and similar repositories for Forensics-Workshop
Users that are interested in Forensics-Workshop are comparing it to the libraries listed below
Sorting:
- Scripts for OSCE☆18Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆17Updated 7 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- buffer overflow examples☆22Updated 7 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 3 years ago
- DC540 hacking challenge 0x00005b.☆17Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆34Updated 6 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆16Updated 8 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 7 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- DNS File EXfiltration☆46Updated last year
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- yet another dirbuster☆19Updated 4 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Updated 4 years ago
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Malquarium - Modern Malware Repository☆47Updated this week
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago