BreizhCTF / breizhctf-2024Links
Breizh CTF 2024 - Challenges
☆14Updated last year
Alternatives and similar repositories for breizhctf-2024
Users that are interested in breizhctf-2024 are comparing it to the libraries listed below
Sorting:
- BreizhCTF 2023 - Challenges☆27Updated 2 years ago
- Search engine for CTF writeups with instant results.☆150Updated 7 months ago
- Web interface to explore Suricata EVE outputs☆72Updated 3 weeks ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆28Updated last year
- Workshop on firmware reverse engineering☆300Updated 3 weeks ago
- ☆40Updated 6 months ago
- The most complete code auditing platform with thousands of real-world challenges☆131Updated 3 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆165Updated 11 months ago
- Virtual machines manipulation framework☆97Updated 2 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆205Updated last year
- 📦 A GitHub Action that performs a security scan of your GitHub Actions.☆26Updated 11 months ago
- Binary Exploitation Phrack CTF Challenge☆133Updated last month
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆155Updated 11 months ago
- eBPF Memory Dump Tool☆86Updated last month
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆70Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 8 months ago
- Outil de sécurité des architectures kubernetes avancées☆56Updated 4 months ago
- A repository of credential stealer formats☆228Updated 4 months ago
- Binary Golf Grand Prix☆62Updated 7 months ago
- Lena's repo of Malware Monsters aka Malmons.☆44Updated 3 weeks ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆86Updated 4 years ago
- Write ups for Ph0wn CTF☆47Updated 2 months ago
- ☆199Updated 9 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 10 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆331Updated this week
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆103Updated 2 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆118Updated 3 months ago
- My personal OT resource list, gather throughout research and internet adventure.☆113Updated this week
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆142Updated last month