☆24Feb 6, 2017Updated 9 years ago
Alternatives and similar repositories for ctf-notes
Users that are interested in ctf-notes are comparing it to the libraries listed below
Sorting:
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- Collection of CTF writeups☆15Sep 20, 2016Updated 9 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Useful crypto tools for CTF☆40Jul 2, 2022Updated 3 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- ☆22Sep 27, 2017Updated 8 years ago
- a repository that contains the program.cs source file that has D/Invoke bare minimum implementation and AES encryption for shellcode exec…☆23Feb 25, 2023Updated 3 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- 어셈블리어를 배워서 써먹자☆21Jun 26, 2018Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- SQL Injection wargame☆25May 2, 2018Updated 7 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Jul 28, 2016Updated 9 years ago
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago