BYU-CSA / BYUCTF-2022View external linksLinks
Source code and writeups for all challenges
☆16May 29, 2022Updated 3 years ago
Alternatives and similar repositories for BYUCTF-2022
Users that are interested in BYUCTF-2022 are comparing it to the libraries listed below
Sorting:
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- ☆29May 1, 2020Updated 5 years ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Mar 22, 2022Updated 3 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Open YARA scan- and search engine☆25Feb 23, 2025Updated 11 months ago
- ☆25Nov 19, 2018Updated 7 years ago
- All android crackme challenges, created by me.☆22Oct 12, 2021Updated 4 years ago
- CTF Writeups☆28Aug 15, 2024Updated last year
- IP lookup service☆28Dec 24, 2022Updated 3 years ago
- ☆31Feb 28, 2025Updated 11 months ago
- A tool pulls loaded binaries ordered by memory regions☆35Sep 27, 2019Updated 6 years ago
- Challenges of the HeroCTF v4 edition.☆35May 3, 2023Updated 2 years ago
- Sources code extracted from malwares for analysis☆41Mar 10, 2023Updated 2 years ago
- Statically unpacking common android banker malware.☆161Apr 2, 2025Updated 10 months ago
- ☆39Mar 12, 2021Updated 4 years ago
- stmctf22☆35Nov 16, 2022Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 4 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆112Feb 8, 2025Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- ☆16Apr 24, 2023Updated 2 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆11Feb 7, 2024Updated 2 years ago
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- It automatically picks OTP from sms. I implemented this without using any Flutter plugin.☆14Nov 15, 2022Updated 3 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Parse CTFd scoreboard into CTFtime JSON format.☆13Dec 1, 2025Updated 2 months ago
- ☆15Sep 24, 2024Updated last year
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- 23–24 мая 2020 ⋅ Юниорские соревнования по информационной безопасности☆10Jun 14, 2020Updated 5 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- Embeds messages into images using the Least Significant Bit algorithm☆11Jan 4, 2023Updated 3 years ago
- ☆11Oct 30, 2024Updated last year
- CLI Version of SKF Labs☆14Oct 3, 2023Updated 2 years ago
- Some Snippets for Frida☆15Feb 27, 2021Updated 4 years ago
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- An app highlighting how you can use the Highlight API☆15Dec 15, 2024Updated last year