nnamon's repositories
ctf101-systems-2015
NUS Greyhats CTF101 Systems Security Lesson Material
big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
awesome-scifi
Sci-Fi worth consuming
cluedo-engine
Cluedo Assistant Engine
coraline
Python Simple Deterministic Mutation Fuzzer supported by CZL's Offset Scores
CS1020_Labs
CS1020 Labs
CS1020_SoapOpera
Soap Opera Solutions for CS1020: Data Structures and Algorithms at NUS
ctf-tools
Some setup scripts for security research tools.
CTFsubmitter
A flag submitter service with distributed attackers for attack/defense CTF games.
DECAF
DECAF(short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
defcoin
Yet another scrypt coin
Hack-Night
Hack Night is an open weekly training session run by the ISIS lab.
imps
MIPS stuff
linux
Linux kernel source tree
miniPDF
A python library for making PDF files in a very low level way.
pixelsort
Pixel sorting images in python.
pywinauto
Windows GUI Automation with Python (64-bit Py3 compatible)
ReflectiveDLLInjection
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
REpsych
Psychological warfare in reverse engineering
sleekpwn
Automated Compromise and Monitor System for Cyber Defenders Discovery Camp 2015
sortstuff
Sorting algorithm implementations and stuff
StudyPrimers
Primers for study topics inspired by https://danielmiessler.com/study/
tentwentytester
Automated Test Case Testing for CS1020
training
Training materials crafted and publicly provided by Red Naga members
Triton
Pin-based concolic execution framework. It provides components like a taint engine, a dynamic symbolic execution engine, a snapshot engine, translation of x64 instructions into SMT2-LIB, a Z3 interface to solve constraints and Python bindings. Based on these components, you can build tools for automate reverse engineering.
vampirebat
quiz format parser and translator
Wordpress-XMLRPC-Brute-Force-Exploit
Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
write-ups-2015
Wiki-like CTF write-ups repository, maintained by the community. 2015