☆13Nov 5, 2017Updated 8 years ago
Alternatives and similar repositories for Hackfest-MiniCTF-2017
Users that are interested in Hackfest-MiniCTF-2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Oct 30, 2022Updated 3 years ago
- Source code from some of the challenges that were presented at http://montrehack.ca☆35Dec 13, 2025Updated 3 months ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 8 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Directory/file & DNS busting tool written in Go☆14Nov 26, 2019Updated 6 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- a simple wii homebrew application demonstrating a simple gba input viewer☆11Apr 22, 2016Updated 9 years ago
- ☆20Feb 3, 2020Updated 6 years ago
- ☆53Dec 3, 2025Updated 3 months ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- Transcribe Greek text to Latin alphabet using the ISO 843:1997 standard (also known as ELOT 743:1987)☆13Oct 12, 2022Updated 3 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆56Dec 23, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- A series of guides on how to setup devices that are Arm SystemReady certified and their firmware.☆15Feb 25, 2022Updated 4 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Jul 13, 2020Updated 5 years ago
- ListACS is an ACS disassembler that supports ZDoom's ACS extensions. It can also attempt to decompile scripts into ACS source code.☆14Jul 22, 2020Updated 5 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Mar 3, 2019Updated 7 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆13Mar 9, 2022Updated 4 years ago
- Who wants to be millionaire game made with MEAN (MongoDB, Express, Angularjs, Nodejs)☆11Mar 27, 2018Updated 7 years ago
- ☆35Dec 5, 2025Updated 3 months ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- **DEPRECATED** Datadog API Python Client☆25Jul 17, 2018Updated 7 years ago
- A fast generative fuzzer for HTTP☆16Nov 29, 2018Updated 7 years ago
- JavaScript simulation of the classical XY model☆14Sep 12, 2013Updated 12 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.☆25Mar 18, 2026Updated last week
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- Game Board for NorthSec's Hacker Jeopardy since 2017☆14May 17, 2025Updated 10 months ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Dec 2, 2016Updated 9 years ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Jul 30, 2019Updated 6 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago