tylert / pocorgtfo
International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)
☆184Updated 7 months ago
Alternatives and similar repositories for pocorgtfo:
Users that are interested in pocorgtfo are comparing it to the libraries listed below
- random brain dumps☆346Updated 7 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆270Updated 4 years ago
- Files from my DEFCON CTF VM.☆268Updated 8 years ago
- KiCad files and all component files to manufacture the IDES OF DEF CON Badge, an Unofficial Electronic Badge.☆10Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Medfusion 4000 security research & a MQX RCE.☆335Updated 7 years ago
- Radare Congress Stuff☆208Updated 2 months ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- PoC || GTFO Issues☆68Updated 4 years ago
- Conference slides and White-papers☆356Updated 5 years ago
- X41 Smartcard Fuzzer☆115Updated 6 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Synesthesia, implemented as Yices scripts☆91Updated 7 years ago
- Radare2 cheat-sheet☆112Updated 6 years ago
- This repository contains a docker container dedicated to reverse engineering☆83Updated 6 years ago
- ☆140Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- The 2017 Crypto and Privacy Village Badge☆31Updated 4 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 6 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆16Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated last year
- RHme+ 2015 challenge☆109Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆285Updated 7 years ago
- WiFi Tracker Confuser☆65Updated 7 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- A portable reverse engineering environment using docker.☆207Updated 6 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago