Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
-
Updated
Feb 21, 2025 - Python
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
An open-source modular framework capable of identifying a wide range of TLS vulnerabilities and assessing compliance with multiple guidelines. Its actionable report can assist the user in correctly and easily fixing their configurations.
A amplification/reflector scanner with CIDR support. Used for finding vulnerable protocols on your network commonly used by attackers to launch DrDoS attacks.
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
Identifies and optionally rejects self-approved mitigations on policy-violating findings.
CTF challenges taken during the course of "Offensive & Defensive Cybersecurity" - Polimi Computer Science Engineering - A.Y. 2024/2025.
Add a description, image, and links to the mitigations topic page so that developers can more easily learn about it.
To associate your repository with the mitigations topic, visit your repo's landing page and select "manage topics."