This contains all CTF challenges from old BYU-only CTFs.
☆16Sep 10, 2024Updated last year
Alternatives and similar repositories for old-ctf-challenges
Users that are interested in old-ctf-challenges are comparing it to the libraries listed below
Sorting:
- Documentation for Vilo router vulnerability research☆15Oct 21, 2024Updated last year
- ☆13Aug 5, 2025Updated 7 months ago
- ☆10Apr 20, 2022Updated 3 years ago
- Challenges, source code, and writeups for BYUCTF 2023☆27May 24, 2023Updated 2 years ago
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Corellium provides premium cheats, tools, hubs, games, media, and exclusive content for advanced users.☆14Feb 28, 2025Updated last year
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- Radar and motion detector purely based on ESP32 onboard wifi radio, multistatic passive version.☆13Dec 24, 2021Updated 4 years ago
- A Rust Hardware Abstraction Layer for the MAX78000 microcontroller☆13Feb 27, 2025Updated last year
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆17Aug 24, 2025Updated 6 months ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Materials from the CS Level-Up trainers☆11Aug 10, 2025Updated 6 months ago
- Cybersecurity Data Mining Competition 2016☆11Jan 19, 2019Updated 7 years ago
- Login and Signup form using PHP & MySQL. The code doesn't contain the elements to encrypt the password. You can enable it by using php bu…☆10Jan 27, 2019Updated 7 years ago
- My custom Archlinux with Hyprland config with Installation script☆15May 12, 2025Updated 9 months ago
- ESP 32 port of the Arduino TheThingsNetwork library.☆12Jul 20, 2025Updated 7 months ago
- ☆12Apr 18, 2024Updated last year
- A maze generator written in Dart and Flutter.☆14Jun 16, 2024Updated last year
- my beautiful page <3☆20Feb 22, 2026Updated last week
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆28Dec 27, 2025Updated 2 months ago
- Clean mvvm architecture WhatsApp clone, buit with Flutter☆14Nov 2, 2020Updated 5 years ago
- A real time web app buit with Go, Fiber and HTMX☆12Jun 9, 2024Updated last year
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- Repository of challenges for SunshineCTF 2019☆14Apr 13, 2019Updated 6 years ago
- Introductory challenges for Ghidra Golf☆14Feb 13, 2023Updated 3 years ago
- A Bash Script that parses through a PCAP file and automatically outputs valuable information about the Network Traffic.☆13May 28, 2024Updated last year
- Materials from the previous MCC trainers☆18Jan 16, 2026Updated last month
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- A python based RECON Tool for collecting data on people by their usernames. Capable of getting data from 50+ websites as of 28/06/2022.☆14Jul 12, 2022Updated 3 years ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year