Cyber Security Challenge Australia 2015 Files
☆40Oct 28, 2016Updated 9 years ago
Alternatives and similar repositories for CySCA2015
Users that are interested in CySCA2015 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Aug 5, 2022Updated 3 years ago
- Windows Heap Loggin'☆11Aug 12, 2020Updated 5 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Use packer to provision a windows AMI, it installs software using powershell☆10Sep 5, 2016Updated 9 years ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12May 20, 2022Updated 3 years ago
- ☆33Feb 25, 2026Updated 3 weeks ago
- ☆16Dec 21, 2023Updated 2 years ago
- ☆14Oct 20, 2015Updated 10 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- Documentation used for Shuffle☆21Updated this week
- ☆10Feb 8, 2024Updated 2 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- RHme+ 2015 challenge☆115Jun 7, 2016Updated 9 years ago
- C# client for interacting with APB lobby and world servers☆12Jun 28, 2018Updated 7 years ago
- ☆23May 11, 2017Updated 8 years ago
- Read input from Twitch, and send keys to other programs☆15Nov 4, 2015Updated 10 years ago
- See the most influential users who have starred or forked a given repo (sorted by earned stars and follower count)☆20Aug 17, 2024Updated last year
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 8 years ago
- Measurement system I built during my PhD to collect and analyse large-scale datasets; including phishing and malware attacks on Twitter, …☆16Jun 25, 2021Updated 4 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- ✨ discord bot / selfbot core☆12Mar 18, 2018Updated 8 years ago
- ABSA Toolkit☆11Jul 31, 2017Updated 8 years ago
- wx-config for Windows☆10Mar 21, 2023Updated 3 years ago
- Experiments of the DAI in Healthcare project - skin lesions images use case - using Flower☆12Jun 16, 2022Updated 3 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- ☆72Nov 27, 2018Updated 7 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago