1r0dm480 / CTF-Wr1T3uPsLinks
Repository to store summaries of CTF challenges
☆28Updated 2 years ago
Alternatives and similar repositories for CTF-Wr1T3uPs
Users that are interested in CTF-Wr1T3uPs are comparing it to the libraries listed below
Sorting:
- ☆64Updated last year
 - Framework for exploiting local vulnerabilities☆84Updated last year
 - Unicode encoding attacks with machine learning☆97Updated 3 years ago
 - Detect hidden files and text in images☆121Updated 2 years ago
 - Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
 - A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
 - A fast, efficient and lightweight (~100 KB) Capture The Flag framework inspired by the HackTheBox platform. Built with Flask.☆111Updated last year
 - ☆46Updated 5 years ago
 - Bug Bounty writeups, Vulnerability Research, Tutorials, Tips&Tricks☆202Updated last year
 - Everything You Need☆18Updated 5 years ago
 - A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆33Updated 8 months ago
 - PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆143Updated 3 years ago
 - Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 5 years ago
 - Slides from my talk at ISC 2018 in Beijing 2018☆94Updated 6 years ago
 - Penetration Testing/Security Cheatsheets☆62Updated 10 years ago
 - Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆20Updated 4 years ago
 - c0r0n4con talk 12 april 2020☆23Updated 5 years ago
 - The walkthrough of hack the box☆67Updated 2 years ago
 - A CTF framework to create, build, deploy and monitor challenges☆117Updated 2 months ago
 - Collection of tips, tools and tutorials around infosec☆31Updated 8 years ago
 - CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Updated 3 years ago
 - Pwn2Win CTF 2020 flag submissions☆29Updated 5 years ago
 - Writeups for all the HTB machines I have done☆64Updated 2 years ago
 - A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆34Updated 3 months ago
 - Top 100 Hacking & Security E-Books (Free Download)☆44Updated 6 years ago
 - scylla.sh db dumps and more☆139Updated 5 years ago
 - Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆46Updated 8 years ago
 - Anti-Automation System☆129Updated 4 years ago
 - Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser☆151Updated last year
 - Challenges and vulnerabilities exploitation.☆59Updated 4 years ago