tylert / pocorgtfoLinks
International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)
☆184Updated 11 months ago
Alternatives and similar repositories for pocorgtfo
Users that are interested in pocorgtfo are comparing it to the libraries listed below
Sorting:
- random brain dumps☆347Updated 7 years ago
- Medfusion 4000 security research & a MQX RCE.☆336Updated 7 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆274Updated 4 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Radare Congress Stuff☆209Updated 6 months ago
- Visual reverse engineering tool.☆276Updated 8 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆120Updated 2 years ago
- CableTap public disclosure documents.☆78Updated 7 years ago
- ☆138Updated 7 years ago
- ☆280Updated 5 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 7 years ago
- ☆163Updated 8 years ago
- Conference slides and White-papers☆357Updated 5 years ago
- Return Oriented Programme Evolution with ROPER☆169Updated 6 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- ☆143Updated 8 years ago
- Documentation for the Mechanical Phish.☆233Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- Radare2 cheat-sheet☆113Updated 6 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago