tj-oconnor / undergrad-vrView external linksLinks
Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybersecurity Class"
☆19Mar 8, 2024Updated last year
Alternatives and similar repositories for undergrad-vr
Users that are interested in undergrad-vr are comparing it to the libraries listed below
Sorting:
- Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).☆20Jun 16, 2024Updated last year
- ☆14Jan 20, 2026Updated 3 weeks ago
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 3 years ago
- a minimalistic winrm client written in python☆25May 15, 2025Updated 8 months ago
- Solution for cryptohack challenges☆21Oct 6, 2021Updated 4 years ago
- ☆28Apr 14, 2023Updated 2 years ago
- All-in-one Scoring Engine☆29Feb 1, 2026Updated last week
- A simple, reliable and reasonably fast network capture analyzer.☆24Feb 7, 2026Updated last week
- Scripts and things.☆13Jan 23, 2026Updated 3 weeks ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆14Apr 29, 2019Updated 6 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆27Nov 10, 2025Updated 3 months ago
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- 之Crypto☆43Jan 6, 2017Updated 9 years ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- My personnal repository☆10Sep 2, 2025Updated 5 months ago
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆13Feb 19, 2021Updated 4 years ago
- OSEP - Offsec Expert Professional☆19Jun 23, 2024Updated last year
- generates unique subdomain names and runs httpx on them☆17Apr 8, 2024Updated last year
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 9 months ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Emulating firmware poorly but quickly!☆15Dec 18, 2020Updated 5 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 2 years ago
- PoC to tunnel via AWS Short-Message-Queues☆23Jun 21, 2025Updated 7 months ago
- Documentation for Vilo router vulnerability research☆15Oct 21, 2024Updated last year
- ☆13Dec 29, 2020Updated 5 years ago
- A/D CTF services developed for ECSC 2022☆12Nov 11, 2022Updated 3 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- ☆13Oct 14, 2022Updated 3 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 4 months ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 weeks ago
- My public talks☆14Oct 1, 2024Updated last year