Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybersecurity Class"
☆19Mar 8, 2024Updated last year
Alternatives and similar repositories for undergrad-vr
Users that are interested in undergrad-vr are comparing it to the libraries listed below
Sorting:
- Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).☆20Jun 16, 2024Updated last year
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 3 years ago
- a minimalistic winrm client written in python☆25Updated this week
- ☆28Apr 14, 2023Updated 2 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Feb 23, 2026Updated last week
- All-in-one Scoring Engine☆29Updated this week
- Scripts and things.☆13Jan 23, 2026Updated last month
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- A simple, reliable and reasonably fast network capture analyzer.☆26Updated this week
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- ☆14Apr 29, 2019Updated 6 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- 之Crypto☆43Jan 6, 2017Updated 9 years ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- game of active directory (SnapLabs version)☆15Aug 12, 2025Updated 6 months ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- My personnal repository☆10Sep 2, 2025Updated 6 months ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Emulating firmware poorly but quickly!☆16Dec 18, 2020Updated 5 years ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 8 months ago
- Documentation for Vilo router vulnerability research☆15Oct 21, 2024Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 5 months ago
- Disassemble V8 Ignition bytecode.☆12Jan 2, 2024Updated 2 years ago
- A/D CTF services developed for ECSC 2022☆12Nov 11, 2022Updated 3 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- Write Singer data to JSONL files☆15Sep 1, 2023Updated 2 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 2 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- My public talks☆14Oct 1, 2024Updated last year
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆20Sep 22, 2025Updated 5 months ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago