Pinned Repositories
Android-Admin-Client
The admin client for the remote test administration server.
Android-Client
The Android client application for accessing the Android testing administration server.
Android-Server
Server application for a test taking platform accessed via Android clients.
ARP-Defense
ARP Poisoning Defense Scripts
avalanche
Automatically exported from code.google.com/p/avalanche
azazel
Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional features, and focuses heavily around anti-debugging and anti-detection.
bap-binaries
Binaries of the Binary Analysis Platform (BAP) compiled in Arch Linux provided for convenience
PCDC-Display
Real time network visualization for Cyber Defense Competitions.
PCDC-UserSim
Simulated Windows domain users for the 2015 Palmetto Cyber Defense Competition.
SimpX
A proof of concept tool that demonstrates virtual machines, dynamic taint analysis, and symbolic execution.
sjcappella's Repositories
sjcappella/PCDC-Display
Real time network visualization for Cyber Defense Competitions.
sjcappella/SimpX
A proof of concept tool that demonstrates virtual machines, dynamic taint analysis, and symbolic execution.
sjcappella/PCDC-UserSim
Simulated Windows domain users for the 2015 Palmetto Cyber Defense Competition.
sjcappella/Android-Admin-Client
The admin client for the remote test administration server.
sjcappella/Android-Client
The Android client application for accessing the Android testing administration server.
sjcappella/Android-Server
Server application for a test taking platform accessed via Android clients.
sjcappella/ARP-Defense
ARP Poisoning Defense Scripts
sjcappella/avalanche
Automatically exported from code.google.com/p/avalanche
sjcappella/azazel
Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional features, and focuses heavily around anti-debugging and anti-detection.
sjcappella/bap-binaries
Binaries of the Binary Analysis Platform (BAP) compiled in Arch Linux provided for convenience
sjcappella/ConfigFiles
Repo for various configuration files.
sjcappella/disfuzz-afl
Distributed Fuzzing for afl
sjcappella/emu_test
Benchmark for some emulators
sjcappella/exploitable
The 'exploitable' GDB plugin. I don't work at CERT anymore, but here is the original homepage: http://www.cert.org/vuls/discovery/triage.html
sjcappella/fuzzgoat
A vulnerable C program for testing fuzzers.
sjcappella/gdsl-toolkit
Generic Decoder Specification Language Toolkit
sjcappella/IE11SandboxEscapes
Some example source code for fixed IE11 sandbox escapes.
sjcappella/openreil
Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)
sjcappella/overwrite_mbr
A collection of tools for overwriting the MBR (Master Boot Record) of a machine with another file.
sjcappella/radare2
unix-like reverse engineering framework and commandline tools
sjcappella/Triton
Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine, AST representations of the x86 and the x86-64 instructions set semantics, SMT simplification passes, an SMT Solver Interface and, the last but not least, Python bindings.
sjcappella/unicorn
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
sjcappella/usercorn
dynamic binary analysis via platform emulation