Insomnihack / Insomnihack-2015
Repository for Insomni'hack finals 2015
☆23Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for Insomnihack-2015
- ☆14Updated 8 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- Vagrant files to bootstrap VM for CTFs☆10Updated 8 years ago
- Configuration security audit framework☆23Updated 8 years ago
- js-beautifier extension for Burp Suite☆30Updated 11 years ago
- Material from our CANAPE workshop☆32Updated 5 years ago
- Capture the flag - security challenges☆13Updated 8 years ago
- CTF & practice exploit collection☆38Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- ☆25Updated this week
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆34Updated 6 years ago
- ☆15Updated 6 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 3 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- ☆50Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆25Updated 7 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆36Updated 6 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆39Updated 8 years ago
- CVE-2016-1287 vulnerability test☆16Updated 8 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 6 years ago
- ☆26Updated 8 years ago