CyberSaiyanIT / rhc22-badge
Cyber Saiyan community has designed and developed a special gadget to celebrate RomHack Camp 2022. Check it out
☆13Updated 6 months ago
Alternatives and similar repositories for rhc22-badge:
Users that are interested in rhc22-badge are comparing it to the libraries listed below
- Flipper Zero firmware source code + Dict attack improvements☆61Updated 2 years ago
- Write ups for Ph0wn CTF☆41Updated 3 months ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 7 years ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆60Updated 6 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- ☆44Updated 3 years ago
- Binary Golf Library☆62Updated 3 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- ☆63Updated 2 years ago
- ☆12Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 4 months ago
- Docker images of the Exegol project☆102Updated last week
- ☆96Updated last year
- Web interface to explore Suricata EVE outputs☆51Updated 3 months ago
- visualizing CTF clusters (teams playing together at DEFCON)☆27Updated last year
- Create polyglot files, which are valid PDF and ZIP simultaneously. See POC||GTFO 07. (forked from git.hackade.org)☆61Updated 3 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures☆18Updated 7 years ago
- ☆44Updated 3 years ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated 9 months ago
- DES Rainbow Table Online Phase☆25Updated 7 years ago
- ☆47Updated 10 months ago
- ☆62Updated 3 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆88Updated last year
- Tool written in Rust to enumerate the valid email addresses of an Azure/Office 365 Tenant☆14Updated last year
- Local Privilege Escalation in polkit's pkexec☆72Updated 3 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆18Updated 4 months ago
- A curated list of hardware-oriented CTF challenges.☆26Updated 5 months ago
- Official repository for MuHack Badge☆8Updated last year
- Keep it secret, keep it safe☆77Updated last month
- ☆204Updated 5 months ago