Writeup oriented CTF
☆22Nov 6, 2017Updated 8 years ago
Alternatives and similar repositories for awesome-ctf-wargame
Users that are interested in awesome-ctf-wargame are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- SECCON2016 online CTF for public☆29Feb 7, 2017Updated 9 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆38Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- ☆14Mar 31, 2018Updated 8 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 9 months ago
- A library for reading, manipulating, and writing dex (and odex) files.☆15Apr 11, 2013Updated 13 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- Boyer-Moore-MagicLen, a fast string search algorithm implemented in Rust.☆13Dec 13, 2025Updated 3 months ago
- Convert IP addresses to emojis☆14Jan 11, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This library provides a simple API client function for DeepL☆15Aug 12, 2020Updated 5 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- ☆10Jul 24, 2020Updated 5 years ago
- Delayed requests for Scrapy☆13Mar 30, 2018Updated 8 years ago
- Decensoring Hentai☆14Sep 19, 2022Updated 3 years ago
- C++ solutions for each of the Project Euler problems.☆12Mar 28, 2018Updated 8 years ago
- Infer Python types from JSON data, use them for auto serialisation and parsing☆13Oct 27, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Python observability & instrumentation primitives for metrics and benchmarking☆12May 12, 2018Updated 7 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- A lightweight, python implementation of onion routing used by tor. This is a proof of concept where the user enters a web url on the comm…☆12Dec 26, 2022Updated 3 years ago
- Another implementation of the paper "Compound Word Transformer: Learning to Compose Full-Song Music over Dynamic Directed Hypergraphs" in…☆13Jun 30, 2021Updated 4 years ago
- Akos is a nocode visual-novel engine☆13Apr 30, 2023Updated 2 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- Scan Onion Services for Security Issues☆11Jun 12, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Notes, code, and wiring diagrams for common audio modules for small electronic projects☆13Oct 30, 2024Updated last year
- A Procedural City Generator script for Maya☆13Aug 7, 2013Updated 12 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- ☆12Feb 19, 2023Updated 3 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- ☆13Oct 14, 2017Updated 8 years ago