Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
翻译 - 我想阅读或已经阅读的与模糊测试,二进制分析和漏洞利用开发相关的学术论文
Enhance the security and privacy of your Windows 10 and Windows 11 deployments with our fully optimized, hardened, and debloated script. Adhere to industry best practices and Department of Defense STI...
Checksec, but for Windows: static detection of security mitigations in executables
Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
An open-source modular framework capable of identifying a wide range of TLS vulnerabilities and assessing compliance with multiple guidelines. Its actionable report can assist the user in correctly an...
hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer
A collection of scripts to assist System Adminsitrators
PoC External Mitigations and Overviews against pixel search based scripts in League of Legends
A amplification/reflector scanner with CIDR support. Used for finding vulnerable protocols on your network commonly used by attackers to launch DrDoS attacks.
Generate password from dictionary with BSD licensing and practices
CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065
Source code release for the 2020 FOCI paper: "Padding Ain’t Enough: Assessing the Privacy Guarantees of Encrypted DNS"
SolarWinds SunBurst Countermeasures
Identifies and optionally rejects self-approved mitigations on policy-violating findings.
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
Focused on functionality when implementing security consequences with regard to formatted output and arithmetic operations in a program.