Writeup oriented CTF
☆22Nov 6, 2017Updated 8 years ago
Alternatives and similar repositories for awesome-ctf-wargame
Users that are interested in awesome-ctf-wargame are comparing it to the libraries listed below
Sorting:
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Open source software for a data analysis platform☆11Jun 9, 2017Updated 8 years ago
- ☆18Mar 23, 2018Updated 7 years ago
- 雪碧0xroot init3@0xroot.cn☆20Nov 1, 2019Updated 6 years ago
- Demangles C++ symbol names genarated by Microsoft Visual C++ in order to retrieve the original C++ declarations.☆33Jun 25, 2020Updated 5 years ago
- Attack data☆26Apr 20, 2018Updated 7 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- SECCON2016 online CTF for public☆29Feb 7, 2017Updated 9 years ago
- SIM Card tunnel for Alcatel OT-918D☆38Sep 29, 2014Updated 11 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Astronomy themed 2048 clone☆19Sep 26, 2018Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- 《算法竞赛入门经典》第二版(第2版)-例题习题解答☆10May 10, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- The kernel for the Wink Hub☆11Oct 29, 2014Updated 11 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- An anti DDoS tool that tries to neutralize proxies denial of service. Created in 2016.☆10Oct 2, 2016Updated 9 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Error Level Analysis (ELA) in ImageJ☆10Oct 17, 2019Updated 6 years ago
- ☆43Oct 28, 2016Updated 9 years ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- Factorio Mod for tracking your milestones☆17Nov 24, 2025Updated 3 months ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Convert IP addresses to emojis☆14Jan 11, 2023Updated 3 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year