Pour nos write ups de CTF ou Rhacklettes party
☆23May 6, 2019Updated 6 years ago
Alternatives and similar repositories for Write-ups
Users that are interested in Write-ups are comparing it to the libraries listed below
Sorting:
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- Aplikasi Tampol Online☆13Dec 1, 2019Updated 6 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- Python-based static analyzer for Android APKs that extracts attack surface and flags high-risk vulnerability patterns with lightweight ta…☆49Updated this week
- HackToday is annual ctf competition held by Cyber Security IPB☆17Mar 19, 2021Updated 4 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- ☆35Dec 2, 2018Updated 7 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- Python script implementing the favicon hash trick to find subdomains.☆38Mar 28, 2023Updated 2 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Nov 1, 2018Updated 7 years ago
- Cyber Jawara 2020 Final - Jeopardy CTF problemset☆33Jul 22, 2022Updated 3 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆18Sep 9, 2025Updated 5 months ago
- ☆10Feb 8, 2024Updated 2 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- "The Legend of Zelda: Majora's Mask 3D" savedata RE☆10Jul 6, 2015Updated 10 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Collection of resources about Virtualization☆10Nov 14, 2019Updated 6 years ago
- eBPF Tools - Tool for monitoring, performance benchmarking and tracing linux kernel☆16Jan 29, 2021Updated 5 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- ☆12Nov 21, 2022Updated 3 years ago
- Promise-based Node API for Epitech Blih☆10Apr 13, 2020Updated 5 years ago
- NUS Greyhats CTF101 Web Security Lesson Material☆10Aug 22, 2015Updated 10 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- ☆10Feb 12, 2026Updated 2 weeks ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- PostScript examples useful for attacking Ghostscript.☆13Aug 1, 2024Updated last year
- Very basic Flask example☆10Aug 21, 2019Updated 6 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago