A Hugo theme to host Capture-The-Flag (CTF) challenges as a static website like hackropole.fr.
☆18Feb 23, 2025Updated last year
Alternatives and similar repositories for hackropole-hugo
Users that are interested in hackropole-hugo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web interface to explore Suricata EVE outputs☆85Updated this week
- Some CTF Write-ups☆27Feb 7, 2022Updated 4 years ago
- A curated list of research and repositories on the novel technique of hardware fuzzing☆20Mar 8, 2026Updated 2 weeks ago
- Handwriting Synthesis with RNNs ✏️☆12Dec 15, 2023Updated 2 years ago
- 2.54 GHz directionnal mega jammer☆26Aug 16, 2025Updated 7 months ago
- https://regexcrossword.com/ solver using Z3py☆20Jan 14, 2022Updated 4 years ago
- Never run out of free events to attend !☆11Oct 3, 2025Updated 5 months ago
- Challenges of the HeroCTF v7 edition.☆52Nov 30, 2025Updated 3 months ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 7 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- Epreuves de sélection de la TeamFR pour l'ECSC 2019.☆162May 1, 2023Updated 2 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- ☆25Nov 2, 2021Updated 4 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆12Jan 23, 2024Updated 2 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Sep 12, 2024Updated last year
- ☆10Jan 8, 2018Updated 8 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- Source for challenges from bi0sCTF☆49Jun 15, 2025Updated 9 months ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- CRY.ME (CRYptographic MEssaging application)☆178Nov 24, 2025Updated 4 months ago
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 6 years ago
- Command line tool to fetch, decode and brute-force CodeIgniter session cookies by guessing and bruteforcing secret keys.☆16Jan 31, 2025Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- ☆14Mar 12, 2023Updated 3 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- SquidClient. HTB Unbalanced edition.☆10Aug 8, 2020Updated 5 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Jun 29, 2025Updated 8 months ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆23Nov 28, 2024Updated last year
- ☆26Nov 25, 2025Updated 4 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆168Nov 18, 2024Updated last year