2022 CTF public release
☆23Jun 15, 2022Updated 3 years ago
Alternatives and similar repositories for ctf-2022-release
Users that are interested in ctf-2022-release are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Prototype Pollution - A detailed study + hands on lab.☆16Oct 11, 2022Updated 3 years ago
- LetMeOutOfYour.net Resources☆21Apr 11, 2026Updated 3 weeks ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 4 years ago
- Generate lua call graph☆15Apr 23, 2023Updated 3 years ago
- Jekyll theme for documentation 📝 built with material web components☆12Updated this week
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻☆127Sep 6, 2022Updated 3 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- ☆12May 13, 2024Updated last year
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- ☆13Apr 17, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- ☆16Nov 15, 2022Updated 3 years ago
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Aug 8, 2022Updated 3 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- tetctf2020_amf_writeups☆23Jan 3, 2021Updated 5 years ago
- Material from ICS Village talk at DEFCON 25☆13Jul 30, 2018Updated 7 years ago
- A Jekyll theme for hosting documentation on GitHub Pages.☆20Jul 8, 2023Updated 2 years ago
- Character Entities for HTML, CSS (content) and Javascript.☆15Aug 1, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆44Apr 11, 2025Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- nativeRasp that can hook native methods☆23Apr 24, 2023Updated 3 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 11 months ago
- ☆24Sep 13, 2022Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 4 years ago
- Chat Bot Security Checklist☆31Jul 4, 2019Updated 6 years ago
- ☆10May 20, 2025Updated 11 months ago
- Software Security Anti-Patterns☆14Oct 31, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- ☆20Mar 13, 2018Updated 8 years ago
- TS/JS ile Zaman Damgası☆14Sep 26, 2024Updated last year
- framework-wizio-pico☆14Oct 22, 2022Updated 3 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- ☆12Aug 5, 2023Updated 2 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Jun 2, 2022Updated 3 years ago