Developed with ♥ by Hackerdom team
☆23Apr 26, 2023Updated 2 years ago
Alternatives and similar repositories for ructf-finals-2023
Users that are interested in ructf-finals-2023 are comparing it to the libraries listed below
Sorting:
- Asynchronous exploit farm for attack-defence CTF☆22Nov 8, 2018Updated 7 years ago
- ☆12Apr 28, 2025Updated 10 months ago
- Attack & Defense CTF Farm based on DestructiveFarm☆128Aug 8, 2025Updated 6 months ago
- This is a repository of personal studies on "storytelling with data".☆16Jan 28, 2021Updated 5 years ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆637Dec 7, 2022Updated 3 years ago
- A simple static site generator, using Markdown and Bash☆11Aug 24, 2020Updated 5 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- ☆22Oct 29, 2024Updated last year
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- BOMBSHOT - пентест-инструмент для симуляции атаки СМС-рассылок.☆21Jan 18, 2023Updated 3 years ago
- Two-Factor Authentication with Telegram Bot for SSH / Shell Login.☆44Sep 4, 2019Updated 6 years ago
- Samsung Exynos 4412 SoC Bootloader☆13Jul 3, 2018Updated 7 years ago
- The rev.ng demos☆13Jan 29, 2026Updated last month
- Hayden Housen's solutions to the 2022 PicoCTF Competition☆10Apr 11, 2022Updated 3 years ago
- Шаблон микросервиса на Golang с чистой архитектурой, gRPC & HTTP API, аутентификацией и многим другим! 🚀☆10Apr 6, 2024Updated last year
- CBC Bit-Flipping Attack Example with Python☆13Jun 14, 2023Updated 2 years ago
- Codeaudit - Modern Python source code security analyzer based on distrust.☆27Feb 19, 2026Updated last week
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11May 11, 2024Updated last year
- YAMPA is Yet Another Mitm Proxy for use in A/D CTFs☆16Jul 11, 2024Updated last year
- A basic Redis leaderboard demo app written in Go☆12Aug 15, 2023Updated 2 years ago
- WIP bl2_ext thingy for ARMv8 MTK devices☆26Jan 27, 2026Updated last month
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Alternative API for IDA / Hex-Rays☆75Sep 18, 2023Updated 2 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- A terminal tool for exploring postgres query plans.☆13Updated this week
- Convert WebAssembly binaries to decompilable ELF non-executables☆14Jul 27, 2023Updated 2 years ago
- ☆16Jun 3, 2025Updated 9 months ago
- Attack/Defense CTF scoreboard parser☆14Aug 20, 2022Updated 3 years ago
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Mar 25, 2020Updated 5 years ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- Some helpful things for AVR☆16Jan 23, 2018Updated 8 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- Cookie & Logins stealer for Firefox + Chrome, demonstration only☆11Apr 5, 2023Updated 2 years ago
- Symbolic execution engine for Whitespace.☆13May 30, 2021Updated 4 years ago
- Fuzzers implemented with libafl to evaluate several techniques on fuzzbench☆13Oct 10, 2024Updated last year