king of the hill cybersecurity competition
☆31May 4, 2022Updated 3 years ago
Alternatives and similar repositories for koth
Users that are interested in koth are comparing it to the libraries listed below
Sorting:
- Collect computer related materials and codes☆20Jan 16, 2026Updated last month
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 5 years ago
- Assembly to python converter☆26Aug 5, 2018Updated 7 years ago
- 🖥️ A reveal.js website for presenting the cyber security basics to humans☆35Apr 15, 2023Updated 2 years ago
- Trying to hack into keyboards☆86Nov 29, 2018Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Feb 26, 2026Updated last week
- ☆10Feb 8, 2024Updated 2 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- Android lockscreen password cracker via ADB (Tested only on Asus Zenfone 4 A450CG )☆10Jul 3, 2017Updated 8 years ago
- A decoding algorithm for quantum error correcting codes.☆16Feb 8, 2026Updated 3 weeks ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 8 months ago
- This script checks visa application status using idata.com.tr services in Turkey (for Germany and Italy) and notifies OSX Notification Ce…☆11Jul 9, 2015Updated 10 years ago
- Knowledge Base System - Ready for Drupal 9 - a wiki system, and a documentation management system designed to host massive amount of cont…☆11Apr 7, 2025Updated 10 months ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- Showcase the books you have read.☆10Oct 2, 2017Updated 8 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10Jan 5, 2022Updated 4 years ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damage☆11Feb 7, 2022Updated 4 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆25Jan 31, 2026Updated last month
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- ☆14Jun 27, 2024Updated last year
- ☆12Feb 9, 2025Updated last year
- Collection of useful utilities for working with Google Cloud Storage.☆13Dec 9, 2022Updated 3 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- DARPA Cyber Grand Challenge Linux source code☆17Jul 9, 2015Updated 10 years ago
- Bytekit is a PHP extension that provides a userspace representation of the opcodes generated by the Zend engine compiler built into PHP.☆19May 21, 2011Updated 14 years ago
- FUSE support for LUKS filesystems☆10Jun 20, 2015Updated 10 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Uses Kinect and EGM to control a ABB robotic arm☆11Aug 31, 2016Updated 9 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago