1. Welcome
  2. Introduction
  3. Psi Beta Rho
  4. 1. Fall 24
    1. 1.1. Fundamentals
      1. 1.1.1. 1: Intro to Linux
      2. 1.1.2. 2: Forensics
      3. 1.1.3. 3: Open Source Reverse Engineering
      4. 1.1.4. 4: Intro to Web & Client-Side Security
      5. 1.1.5. 5: HTTP Requests
      6. 1.1.6. 6: Introduction to Cryptography
      7. 1.1.7. 7: Modern Cryptography Basics
    2. 1.2. Web
      1. 1.2.1. 1: Intro to Web & Client-Side Security
      2. 1.2.2. 2: HTTP Requests
      3. 1.2.3. 3: Local File Inclusion
      4. 1.2.4. 4: Advanced Local File Inclusion
      5. 1.2.5. 5: XSS
      6. 1.2.6. 6: XSS
      7. 1.2.7. 7: Writeups
    3. 1.3. Crypto
      1. 1.3.1. 1: Intro to cryptography
      2. 1.3.2. 2: Block Ciphers
      3. 1.3.3. 3: Stream & Block Ciphers
      4. 1.3.4. 4: Modular Arithmetic, DHKE
      5. 1.3.5. 5: RSA
      6. 1.3.6. 6: RSA Attacks
      7. 1.3.7. 7: Digital Signatures & Writeups
    4. 1.4. Rev
      1. 1.4.1. 1: Intro to Reverse Engineering
      2. 1.4.2. 2: Assembly
      3. 1.4.3. 3: Assembly Part 2
      4. 1.4.4. 4: GDB
      5. 1.4.5. 5: Decompilers
    5. 1.5. Pwn
      1. 1.5.1. 1: Intro to Pwn
      2. 1.5.2. 2: Return-Oriented Programming
  5. 2. Winter 25
    1. 2.1. Web
      1. 2.1.1. 1: Basic SQL Injection
      2. 2.1.2. 2: Advanced SQL Injection
      3. 2.1.3. 3: LACTF Challenges
      4. 2.1.4. 4: XSS, CSP
    2. 2.2. Crypto
      1. 2.2.1. 1: Intro to Cryptography/Math
      2. 2.2.2. 2: Modular Arithmetic/RSA
      3. 2.2.3. 3: RSA
      4. 2.2.4. 4: Signatures, Symmetric Cryptography
      5. 2.2.5. 5: PRNGs and Writeups
  6. 3. Spring 25
    1. 3.1. Crypto
      1. 3.1.1. 1: Intro to Cryptography
      2. 3.1.2. 2: Symmetric Cryptography
      3. 3.1.3. 3: Advanced Symmetric Cryptography
    2. 3.2. Rev / Pwn
      1. 3.2.1. 1: Intro to Reverse Engineering
      2. 3.2.2. 2-3: Intro to Assembly
      3. 3.2.3. 4: GDB
    3. 3.3. Web
      1. 3.3.1. 1-2: CSS Exfiltration Attack
      2. 3.3.2. 3: JWT
  7. 4. Resources
    1. 4.1. General
    2. 4.2. Cryptography
    3. 4.3. Web Exploitation
    4. 4.4. Reverse Engineering
    5. 4.5. Binary Exploitation
    6. 4.6. Miscellaneous
      1. 4.6.1. Forensics
      2. 4.6.2. OSINT
      3. 4.6.3. Blockchain
  8. 5. Appendix

Psi Beta Rho Wiki

Cryptography

Resources

Cryptohack

https://cryptohack.org/

Cryptopals

https://cryptopals.com/

RSA Attacks

https://crypto.stanford.edu/~dabo/papers/RSA-survey.pdf

Standard Curve Database

https://neuromancer.sk/std/

Ben Lynn's Website

https://crypto.stanford.edu/pbc/notes/

Dan Boneh and Victor Shoup's Textbook

https://toc.cryptobook.us/

A Gentle Tutorial for Lattice-Based Cryptoanalysis

https://eprint.iacr.org/2023/032.pdf

Cryptology ePrint Archive

https://eprint.iacr.org/

Tools

Boxentriq

https://www.boxentriq.com/

dCode

https://www.dcode.fr/en

Sagemath

https://www.sagemath.org/

Alpertron Integer Factorization Calculator

https://www.alpertron.com.ar/ECM.HTM

Z3 Python Tutorial

https://ericpony.github.io/z3py-tutorial/guide-examples.htm

Ciphey

https://github.com/Ciphey/Ciphey