tj-oconnor / undergrad-vrLinks
Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybersecurity Class"
☆16Updated last year
Alternatives and similar repositories for undergrad-vr
Users that are interested in undergrad-vr are comparing it to the libraries listed below
Sorting:
- Repo of RIT CCDC Team Scripts☆14Updated 3 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆76Updated last year
- ☆105Updated last year
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆114Updated last month
- Powershell Linter☆84Updated 2 weeks ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆105Updated 3 years ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆48Updated 6 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆160Updated 3 weeks ago
- Retired TrustedSec Capabilities☆248Updated 10 months ago
- A curated list of resources for the OSED journey.☆67Updated 3 years ago
- Binary Exploitation Phrack CTF Challenge☆133Updated last month
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 2 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆49Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆136Updated 11 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 8 months ago
- ☆82Updated 10 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 8 months ago
- ☆64Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆83Updated last month
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆23Updated 9 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆50Updated 4 years ago
- ☆39Updated 10 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- DPAPILAB Next Gen, script collection☆91Updated 3 years ago
- vulnerable windows binaries for exploitation practice☆44Updated 3 years ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆292Updated last month
- Tools for analyzing EDR agents☆264Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago