victor-infosec / conference
cybersecurity conference materials
☆15Updated 5 years ago
Alternatives and similar repositories for conference:
Users that are interested in conference are comparing it to the libraries listed below
- A IDAPython script for searching overflows by IDA.☆21Updated 7 years ago
- ☆35Updated 6 years ago
- Mobile Security Keynote☆33Updated 6 years ago
- LCTF 2018 Platform☆16Updated last year
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)☆48Updated 5 years ago
- ☆23Updated 3 years ago
- Some tools for CTF off line☆19Updated 7 years ago
- QWB 2019 official writeups☆64Updated 5 years ago
- 2018大学生信息安全国赛pwn出题docker☆26Updated 6 years ago
- Build a database of libc offsets to simplify exploitation☆12Updated 8 years ago
- Knowledge Base 慢雾安全团队知识库☆29Updated 5 years ago
- ☆29Updated 4 years ago
- Useful tools for writing shellcode☆67Updated 4 years ago
- To store some CTF crypto scripts.☆15Updated 6 years ago
- source code of XCTF 2019 Final web task "tfboys"☆29Updated 2 years ago
- Vulnerability Verification Environment based on Docker☆112Updated 5 years ago
- 常用蓝牙漏洞CVE poc、EXP☆37Updated 6 years ago
- A collection of pwn execrise☆28Updated 5 years ago
- CTF stuff☆40Updated 2 years ago
- T00ls.Net 2017第一期线下沙龙(北京)PPT合集☆20Updated 7 years ago
- attachments for forum of RealWorld CTF 3rd☆41Updated 4 years ago
- 作为博客☆11Updated 4 years ago
- xinetd-kafel is a more secure replacement for xinetd with secure computing (seccomp, only work on linux)☆19Updated 6 years ago
- This project contains the challenges & writeups for LANCTF 2019☆15Updated 6 years ago
- 二进制渗透题目汇总☆54Updated 4 years ago
- ☆20Updated 5 years ago
- Syclover PPT☆30Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆54Updated 3 years ago
- 做过的实验,踩过的坑☆40Updated 6 years ago
- r3kapig website☆32Updated this week