A small binary exploitation challenge to demonstrate a typical return2libc attack
☆33Apr 12, 2023Updated 3 years ago
Alternatives and similar repositories for misfortune-ctf-challenge
Users that are interested in misfortune-ctf-challenge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shitty Nim code that reads in a file and converts it into \x hex representation, for the use of shellcode binaries.☆64Jun 28, 2023Updated 2 years ago
- Free and publicly available training labs and exercises, for quick copy-and-paste demonstrations, learning and education.☆129Feb 27, 2023Updated 3 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated 2 years ago
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 🔱 Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.☆14Sep 8, 2024Updated last year
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- HackTheBox rich presence for Discord☆14May 30, 2024Updated last year
- Metakitty, The Metasploit Resource Portal☆18Mar 30, 2026Updated last month
- A BBC Micro Emulator based on Fyne and skx/gobasic☆24Aug 8, 2022Updated 3 years ago
- MFA and 2FA chainers, authentication PenTesting frameworks.☆19Jul 9, 2024Updated last year
- ☆24Apr 28, 2024Updated 2 years ago
- ☆14Dec 5, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Lambda Calculus compiler targeting x86, written in Racket☆11Jun 14, 2020Updated 5 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆23Sep 4, 2023Updated 2 years ago
- World's fastest and most advanced GPGPU-based password recovery utility☆20Jul 13, 2025Updated 9 months ago
- ☆17Sep 25, 2024Updated last year
- Se trata de un análisis forense de un caso real, que por medio de una imagen, se obtiene una serie de datos que ayudan a una investigació…☆22May 11, 2018Updated 7 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- ☆61Dec 13, 2025Updated 4 months ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CTF writeups by ./Vespiary☆15Nov 12, 2023Updated 2 years ago
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆18Jul 21, 2024Updated last year
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆21Apr 3, 2024Updated 2 years ago
- ☆36Jul 16, 2023Updated 2 years ago
- CRLF Detection based on @BlackFan 's work See link below☆17Mar 14, 2024Updated 2 years ago
- ☆16Apr 12, 2023Updated 3 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 5 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated 2 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- A curated list of CPU Schedulers for linux☆13Mar 7, 2022Updated 4 years ago