Repository for Insomni'hack finals 2015
☆22Mar 30, 2015Updated 11 years ago
Alternatives and similar repositories for Insomnihack-2015
Users that are interested in Insomnihack-2015 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Apr 28, 2016Updated 10 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 6 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- A few exercises from Zed Shaw’s “Learn C the Hard Way”☆21Dec 16, 2019Updated 6 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆50Apr 11, 2026Updated 3 weeks ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Tool for CVE-2018-16323☆82Jan 17, 2019Updated 7 years ago
- ☆49Feb 16, 2018Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 11 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Prometheus client for DysonLink fans (Pure Hot+Cool)☆13Nov 28, 2023Updated 2 years ago
- A quarantine for rspamd using SQL as backend☆14Mar 3, 2017Updated 9 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- A simple desktop Wiki engine built around Markdown and git☆17Nov 15, 2021Updated 4 years ago
- An eBPF detection program for CVE-2022-0847☆29Jul 5, 2022Updated 3 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated 2 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 8 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 5 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- The Internetwache CTF 2016 repository☆74Mar 28, 2021Updated 5 years ago
- An in progress learning kernel for x86.☆14Sep 18, 2017Updated 8 years ago
- Crackme collections☆14May 24, 2020Updated 5 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- ☆10Jun 2, 2020Updated 5 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆82Oct 11, 2019Updated 6 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- Small CTF challenges running on Docker☆158Jul 26, 2018Updated 7 years ago