Challenges used in CUCTF 2019
☆25Oct 13, 2019Updated 6 years ago
Alternatives and similar repositories for cuctf-2019-challenges
Users that are interested in cuctf-2019-challenges are comparing it to the libraries listed below
Sorting:
- presentations given by CU Cyber☆14Aug 23, 2020Updated 5 years ago
- RootersCTF 2019 challenges☆18Oct 12, 2019Updated 6 years ago
- REVerse ENGineering Environment☆64May 3, 2024Updated last year
- A proving grounds for young and aspiring BBOT modules☆15Aug 31, 2022Updated 3 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- Golang CLI binary used for installing and managing Ghostwriter☆19Feb 24, 2026Updated 3 weeks ago
- ☆22Aug 28, 2023Updated 2 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- Golang wrapper library for nmap.☆24Nov 19, 2021Updated 4 years ago
- Kernel-Mode Rootkit Hunter☆376Nov 13, 2021Updated 4 years ago
- Source files and writeups for UTCTF 2019☆14Oct 21, 2020Updated 5 years ago
- High efficiency and embeddable MPM implementation.☆16Mar 4, 2022Updated 4 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- Helper crate for building Windows Kernel Drivers.☆25Jun 29, 2023Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- IoT Security Checker is a framework for automating some IoT-related security checks☆33Aug 29, 2018Updated 7 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Dec 2, 2025Updated 3 months ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- go reversing helpers for binaryninja☆32Feb 18, 2023Updated 3 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- ☆17Aug 26, 2024Updated last year
- Run Unikraft ELF Loader app on Linux executables☆15Oct 19, 2023Updated 2 years ago
- General research for Dreadnode☆27Jun 17, 2024Updated last year
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- ☆13May 5, 2018Updated 7 years ago
- Generates video game music using neural networks.☆12Jun 9, 2022Updated 3 years ago
- ☆21Sep 10, 2024Updated last year
- ☆18Feb 27, 2020Updated 6 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆12Nov 26, 2025Updated 3 months ago
- A persistent database + CLI for your BBOT scan data 🧡☆42Mar 12, 2026Updated last week
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16May 4, 2019Updated 6 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- Playing with Linux processes termination in Rust☆16Sep 7, 2022Updated 3 years ago
- CLI and API server for https://github.com/dreadnode/robopages☆38Updated this week