ctf challenges by salt
☆16Jul 8, 2019Updated 6 years ago
Alternatives and similar repositories for ctf-challenges
Users that are interested in ctf-challenges are comparing it to the libraries listed below
Sorting:
- Build a database of libc offsets to simplify exploitation☆12Dec 7, 2016Updated 9 years ago
- ☆17May 29, 2018Updated 7 years ago
- n0js xss challenges☆27Nov 1, 2018Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Official repository containing files related to N1CTF 2018.☆223Apr 26, 2018Updated 7 years ago
- ☆17Apr 21, 2017Updated 8 years ago
- ☆19May 23, 2019Updated 6 years ago
- realworld ctf live stream☆74Feb 4, 2024Updated 2 years ago
- Official repository containing files related to *ctf 2018☆140Nov 26, 2018Updated 7 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Jan 14, 2019Updated 7 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- ☆17May 9, 2017Updated 8 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- Json Pattern Validator☆10Nov 17, 2025Updated 3 months ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Simple PoC to leak contents from embedded origin☆26Sep 17, 2019Updated 6 years ago
- From The Shadow : )☆21Apr 13, 2019Updated 6 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- 一些漏洞分析☆48Jan 8, 2019Updated 7 years ago
- Java every minor versions.☆74Apr 19, 2023Updated 2 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- my write up about ctf☆15Jan 29, 2018Updated 8 years ago
- Private CTF scripts☆12Aug 7, 2024Updated last year
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- A simple parser(library) which extracts shimcache data from windows.☆15May 20, 2019Updated 6 years ago
- ☆13Jan 5, 2017Updated 9 years ago
- ☆60Sep 27, 2023Updated 2 years ago
- The slides I have ever presented☆132Aug 18, 2018Updated 7 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ☆13Oct 12, 2017Updated 8 years ago
- ☆14Oct 25, 2019Updated 6 years ago