BYU-CSA / old-ctf-challengesView external linksLinks
This contains all CTF challenges from old BYU-only CTFs.
☆16Sep 10, 2024Updated last year
Alternatives and similar repositories for old-ctf-challenges
Users that are interested in old-ctf-challenges are comparing it to the libraries listed below
Sorting:
- ☆13Aug 5, 2025Updated 6 months ago
- ☆10Apr 20, 2022Updated 3 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- Corellium provides premium cheats, tools, hubs, games, media, and exclusive content for advanced users.☆14Feb 28, 2025Updated 11 months ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 2 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- My custom Archlinux with Hyprland config with Installation script☆15May 12, 2025Updated 9 months ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- Clean mvvm architecture WhatsApp clone, buit with Flutter☆14Nov 2, 2020Updated 5 years ago
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆27Dec 27, 2025Updated last month
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 2 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- A Linux Kernel module keylogger, so that we can log all the keystrokes no matter who is the user! 🧐☆12May 22, 2020Updated 5 years ago
- A maze generator written in Dart and Flutter.☆14Jun 16, 2024Updated last year
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- Introductory challenges for Ghidra Golf☆14Feb 13, 2023Updated 3 years ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- A Bash Script that parses through a PCAP file and automatically outputs valuable information about the Network Traffic.☆13May 28, 2024Updated last year
- Repository of challenges for SunshineCTF 2019☆14Apr 13, 2019Updated 6 years ago
- ☆19Apr 28, 2025Updated 9 months ago
- Distributed File System written in C which implements some of the features of a large-scale distributed file system☆18Oct 27, 2019Updated 6 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆31Oct 24, 2025Updated 3 months ago
- Zeromutarts Capture the Flag 2013 challenge writeups☆22Dec 9, 2013Updated 12 years ago
- PostgreSQL and Java: training☆16Mar 17, 2017Updated 8 years ago
- Small python script to extract Facebook deeplinks from an APK file☆14Oct 30, 2020Updated 5 years ago
- Extract the opcode from the objdump of a binary☆13Dec 28, 2015Updated 10 years ago
- CVE-2025-3248 Langflow RCE Exploit☆16Jun 17, 2025Updated 7 months ago
- This is a Forensics Report made after a thorough digital examination of the Jeans Case Evidence Image.☆18Aug 6, 2020Updated 5 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Jan 6, 2019Updated 7 years ago
- Challenges, flags, solvers and writeups for the Securinets INSAT Friendly CTF edition 2024.☆23Oct 16, 2024Updated last year
- ☆24Apr 5, 2025Updated 10 months ago
- My RE challenge from Northsec 2018.☆14Jun 1, 2022Updated 3 years ago
- Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, …☆56Jan 28, 2026Updated 2 weeks ago
- ☆58Jan 22, 2026Updated 3 weeks ago
- Malicious Network Traffic Analysis with AI☆22Feb 1, 2024Updated 2 years ago