nnamon's repositories

ctf101-systems-2015

NUS Greyhats CTF101 Systems Security Lesson Material

Language:PythonLicense:MITStargazers:9Issues:5Issues:0

big-list-of-naughty-strings

The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

Language:PythonLicense:MITStargazers:1Issues:0Issues:0

awesome-scifi

Sci-Fi worth consuming

Stargazers:0Issues:0Issues:0

cluedo-engine

Cluedo Assistant Engine

Language:PythonStargazers:0Issues:0Issues:0

coraline

Python Simple Deterministic Mutation Fuzzer supported by CZL's Offset Scores

Language:PythonStargazers:0Issues:0Issues:0

CS1020_Labs

CS1020 Labs

Stargazers:0Issues:0Issues:0

CS1020_SoapOpera

Soap Opera Solutions for CS1020: Data Structures and Algorithms at NUS

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

ctf-tools

Some setup scripts for security research tools.

Language:ShellStargazers:0Issues:0Issues:0

CTFsubmitter

A flag submitter service with distributed attackers for attack/defense CTF games.

Language:PythonStargazers:0Issues:0Issues:0

DECAF

DECAF(short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.

Language:CLicense:GPL-3.0Stargazers:0Issues:0Issues:0

defcoin

Yet another scrypt coin

Language:C++License:MITStargazers:0Issues:0Issues:0

Hack-Night

Hack Night is an open weekly training session run by the ISIS lab.

Language:C++Stargazers:0Issues:0Issues:0

imps

MIPS stuff

Stargazers:0Issues:0Issues:0

linux

Linux kernel source tree

Language:CLicense:NOASSERTIONStargazers:0Issues:0Issues:0

miniPDF

A python library for making PDF files in a very low level way.

Language:PythonStargazers:0Issues:0Issues:0

pixelsort

Pixel sorting images in python.

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

pywinauto

Windows GUI Automation with Python (64-bit Py3 compatible)

Language:PythonLicense:LGPL-2.1Stargazers:0Issues:0Issues:0

ReflectiveDLLInjection

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

Language:CLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

REpsych

Psychological warfare in reverse engineering

Language:AssemblyStargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:0Issues:0

sleekpwn

Automated Compromise and Monitor System for Cyber Defenders Discovery Camp 2015

Language:PythonLicense:Apache-2.0Stargazers:0Issues:0Issues:0

sortstuff

Sorting algorithm implementations and stuff

Language:PythonStargazers:0Issues:0Issues:0

StudyPrimers

Primers for study topics inspired by https://danielmiessler.com/study/

Stargazers:0Issues:0Issues:0

tentwentytester

Automated Test Case Testing for CS1020

Language:PythonLicense:GPL-2.0Stargazers:0Issues:0Issues:0

training

Training materials crafted and publicly provided by Red Naga members

Stargazers:0Issues:0Issues:0

Triton

Pin-based concolic execution framework. It provides components like a taint engine, a dynamic symbolic execution engine, a snapshot engine, translation of x64 instructions into SMT2-LIB, a Z3 interface to solve constraints and Python bindings. Based on these components, you can build tools for automate reverse engineering.

Language:C++License:LGPL-3.0Stargazers:0Issues:0Issues:0

vampirebat

quiz format parser and translator

Language:PythonStargazers:0Issues:0Issues:0

Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield

Language:PythonStargazers:0Issues:0Issues:0

write-ups-2015

Wiki-like CTF write-ups repository, maintained by the community. 2015

Language:CSSStargazers:0Issues:0Issues:0
Language:GroffStargazers:0Issues:0Issues:0