top of page

Course Materials for Undergrad Reverse Engineering 

As presented in Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course.

  • Reverse Engineering Course Materials, [Github Repository]

  • Please cite: TJ OConnor, Carl Mann, Tiffanie Petersen, Isaiah Thomas and Chris Stricklan. Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course.  In Innovation and Technology in Computer Science Education (ITiCSE), Dublin, Ireland, July 2022. ACM. [bib] [pdf]

Archived Cybersecurity Competitions

Labeled Dataset of IoT Malware

As presented in Toward a Labeled Dataset of IoT Malware Features

  • Labeled Dataset

  • Please cite Stian Olsen and TJ OConnor. Toward a Labeled Dataset of IoT Malware Features. IEEE Computers, Software, and Applications Conference (COMPSAC 2023), Torino, Italy, June 2023. [bib] [pdf]

Labeled Dataset of IoT Traffic

As presented in Through the Spyglass: Towards Labeling on-demand IoT traffic

  • Labeled Dataset

  • Please cite Daniel Campos and TJ OConnor. Towards labeling on-demand iot traffic. In Cyber Security Experimentation and Test (CSET), Virtual Event, August 2021. USENIX. [bib] [pdf]

MITMProxy Scripts for Vulnerable IoT Companion Apps

As presented in Through the Spyglass: Toward IoT Companion App 

  • MITMProxy Scripts

  • Please cite TJ OConnor, Dylan Jesse, and Daniel Camps. Through the spyglass: Toward IoT companion app man-in-the-middle attacks. In Cyber Security Experimentation and Test (CSET), Virtual Event, August 2021. USENIX. [bib] [pdf]

Metasploit Modules for HoneyBadger Framework

   

    As presented at ShmooCon 2013: Hide and Seek, Post-Exploitation Style

 

Violent Python

bottom of page