ufidon / softsec
course materials and references for its450
☆32Updated 3 years ago
Alternatives and similar repositories for softsec:
Users that are interested in softsec are comparing it to the libraries listed below
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆82Updated last week
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- Exercise writeups from the book Practical Malware Analysis.☆206Updated last year
- Challenge repository for the 2023 CSAW CTF Qualifiers☆30Updated last year
- All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆37Updated 7 years ago
- Here you can find writeups from various CTFs that I've participated in.☆11Updated last year
- Dataset with labeled benign and malicious files 🗃️☆116Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated last year
- CTF challenges designed and implemented in machine learning applications☆146Updated 7 months ago
- RootersCTF 2019 challenges☆18Updated 5 years ago
- Source code for my books☆163Updated 2 years ago
- Coursera course Number Theory and Cryptograph quiz answers☆9Updated 4 years ago
- This contains a list of tools for security assessments of android applications.☆26Updated last week
- A machine learning malware analysis framework for Android apps.☆126Updated last year
- Udemy – Linux Heap Exploitation☆41Updated 3 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆185Updated 8 months ago
- Buffer Overflow Exploitation Examples☆43Updated 6 years ago
- An interactive module to help you learn how to fuzz your first target☆165Updated 8 months ago
- Papers I have collected and read in undergraduate and graduate period☆51Updated last year
- Writeups for each ctf we have partecipated☆40Updated 2 years ago
- Malware detector and classifier based on static analysis of PE executables☆9Updated last year
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- Malware analysis tools used alongside "Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software" Book by Andrew Ho…☆40Updated 6 years ago
- Let's get familiar with Windows pwn 😎☆45Updated 5 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 5 years ago
- ☆31Updated 4 years ago
- A large-scale database of malicious software images☆47Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆143Updated 2 months ago
- Covers Top 10 OWASP Mobile Vulnerabilities☆118Updated 11 months ago
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆101Updated last year