1r0dm480 / CTF-Wr1T3uPsLinks
Repository to store summaries of CTF challenges
☆28Updated 2 years ago
Alternatives and similar repositories for CTF-Wr1T3uPs
Users that are interested in CTF-Wr1T3uPs are comparing it to the libraries listed below
Sorting:
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 5 years ago
- ☆64Updated last year
- Collection of tips, tools and tutorials around infosec☆31Updated 8 years ago
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- Detect hidden files and text in images☆121Updated 2 years ago
- c0r0n4con talk 12 april 2020☆23Updated 5 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆34Updated last month
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆145Updated 3 years ago
- ☆36Updated 3 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 6 months ago
- Repository to save all write-ups from UAM challenges☆29Updated 4 years ago
- Summary & User Write-Ups of Hacky Easter 2019☆51Updated 5 years ago
- Python script to crack hashes using online services☆89Updated 4 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆20Updated 4 years ago
- ☆30Updated 5 years ago
- A small cli utility for interacting with Hack the Box☆35Updated 2 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 5 years ago
- ☆68Updated 5 years ago
- Encrypt your password or decrypt your hash. Multiple algorithms supported.☆19Updated 8 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆123Updated 5 years ago
- LDAP Injection Vulnerability Application(Blog Sample Code)☆20Updated 6 years ago
- Password-protected writeups of HTB platform (challenges and boxes) https://cesena.github.io/☆22Updated 3 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆86Updated 2 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 4 years ago