☆22May 7, 2024Updated last year
Alternatives and similar repositories for ctf-2024-release
Users that are interested in ctf-2024-release are comparing it to the libraries listed below
Sorting:
- ☆17Apr 27, 2025Updated 10 months ago
- ☆24Aug 21, 2023Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- TCP1P CTF 2024 Challenges Repo☆27Oct 15, 2024Updated last year
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆22Nov 7, 2025Updated 3 months ago
- ☆27Aug 19, 2024Updated last year
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- ☆14Jul 1, 2025Updated 8 months ago
- 课程设计——中国教育网网络拓扑探测☆10Apr 8, 2024Updated last year
- WinDbg cheat sheet☆16May 10, 2023Updated 2 years ago
- IPython console widget for Binary Ninja☆15Mar 22, 2025Updated 11 months ago
- ☆11Apr 9, 2024Updated last year
- python to tax form compiler☆12Jun 6, 2022Updated 3 years ago
- AI Powered Dockerfile Generator Using Llama3.1 with GROQ☆11Oct 24, 2024Updated last year
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Challenge handouts, source code, and solutions for UofTCTF 2026☆37Jan 13, 2026Updated last month
- Remove WPP calls from hexrays decompiled code☆56Jan 31, 2026Updated last month
- Official GDG Algiers CTF 2022 Writeups☆39Oct 19, 2022Updated 3 years ago
- Slack Parser is a script to parse slack database and extract user-data, chat history, workspace information☆16Feb 21, 2021Updated 5 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- ☆18Feb 2, 2023Updated 3 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 6 years ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆19Jul 9, 2025Updated 7 months ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- A Python script to find and watch YouTube videos from the terminal without requiring API keys.☆12Feb 28, 2025Updated last year
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- ☆13Feb 9, 2022Updated 4 years ago
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆14Mar 21, 2025Updated 11 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14May 26, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12Aug 12, 2021Updated 4 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- ☆14Sep 11, 2019Updated 6 years ago
- ☆12Apr 10, 2023Updated 2 years ago