Challenges used at the Cambridge 2 Cambridge event
☆22May 26, 2016Updated 9 years ago
Alternatives and similar repositories for c2c-rapidfire-challenges
Users that are interested in c2c-rapidfire-challenges are comparing it to the libraries listed below
Sorting:
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- A library to parse and generate the graphviz dot langauge.☆10Feb 13, 2019Updated 7 years ago
- Dashboard combining☆11Jul 3, 2020Updated 5 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Simple Object Driven Automation☆11Jun 23, 2022Updated 3 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 7 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 10 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- Automated Measurement and Analysis of Open-Source Software☆14Oct 6, 2017Updated 8 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 8 years ago
- Mini CA☆12Sep 7, 2015Updated 10 years ago
- @crossplane Providers as a Function (PaaF)☆10Nov 8, 2020Updated 5 years ago
- A simple website introducing the CNAB project.☆16Jul 11, 2023Updated 2 years ago
- A static analysis framework for NASL.☆14Nov 30, 2022Updated 3 years ago
- Find first derivatives of functions automagically☆10Feb 21, 2017Updated 9 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Freiscale Semicomposer -- music composition without scales☆11Apr 3, 2023Updated 2 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- The alternative for var_dump function☆10Nov 23, 2019Updated 6 years ago
- ☆11Apr 22, 2022Updated 3 years ago
- HTML5 Soundboard☆18Apr 29, 2017Updated 8 years ago
- Fixing annoying password typos during login☆11Jan 21, 2022Updated 4 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago