Cyber Security Challenge Australia 2015 Files
☆40Oct 28, 2016Updated 9 years ago
Alternatives and similar repositories for CySCA2015
Users that are interested in CySCA2015 are comparing it to the libraries listed below
Sorting:
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- HackToday is annual ctf competition held by Cyber Security IPB☆17Mar 19, 2021Updated 4 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Aug 5, 2022Updated 3 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆39Apr 15, 2017Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 9 years ago
- NTFS parser, plus linking capabilites between MFT LogFile and UsnJrnl☆38Aug 23, 2016Updated 9 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Use packer to provision a windows AMI, it installs software using powershell☆10Sep 5, 2016Updated 9 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- ☆60Jun 16, 2011Updated 14 years ago
- All documentation, installation and setup instructions to deploy the COSSIM framework. This is the starting point for the COSSIM framewor…☆11Jun 22, 2025Updated 8 months ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- PERCEIVE is a project incubator inspired by Apache Incubator and Stack Exchange's Area 51. It serves as a staging zone repository for the…☆13May 21, 2018Updated 7 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- Populate a MongoDB collection with OpenStreetMap data☆26Sep 10, 2011Updated 14 years ago
- PostScript examples useful for attacking Ghostscript.☆13Aug 1, 2024Updated last year
- Noita API Extension☆13Aug 29, 2025Updated 6 months ago
- Simple read/write and commentable config files for go☆11Jul 2, 2016Updated 9 years ago
- ☆10Mar 18, 2019Updated 6 years ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- Docker Machine driver that uses Terraform for infrastructure provisioning☆11Nov 23, 2016Updated 9 years ago
- A multi-stream TCP relay over UDP. Fixes connecting to minecraft across the world.☆12Jan 16, 2022Updated 4 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- NUS Greyhats CTF101 Web Security Lesson Material☆10Aug 22, 2015Updated 10 years ago
- Get started on the PicoCalc using the Pico-Series C/C++ SDK.☆28Jan 31, 2026Updated last month
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Jan 1, 2021Updated 5 years ago
- A set of additional PHPStan rules used in Oro products.☆13Feb 2, 2026Updated 3 weeks ago