Writeups for Pico CTF 2017 capture the flag hacking compeition
☆14Mar 21, 2018Updated 7 years ago
Alternatives and similar repositories for PicoCTF2017
Users that are interested in PicoCTF2017 are comparing it to the libraries listed below
Sorting:
- Th3g3ntl3man CTF Writeups☆22Sep 17, 2018Updated 7 years ago
- Send WiFi credentials over audio to a "thing"☆28Oct 26, 2018Updated 7 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆35Sep 3, 2021Updated 4 years ago
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- An implementation of Oculus' firmware update services from the Oculus Quest 2 in nodejs. Features were reverse engineered from the offici…☆14Jan 7, 2022Updated 4 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- PDiff: Semantic-based Patch Presence Testing for Downstream Kernels☆14Nov 8, 2020Updated 5 years ago
- The best game bot for mobile game vHack OS. It completely automates your game. So do not hesitate and download and play 24/7 like everyon…☆18Sep 8, 2018Updated 7 years ago
- ☆11Nov 20, 2019Updated 6 years ago
- Protect your privacy and security online☆10Sep 19, 2016Updated 9 years ago
- The Decompressoin tool for Vxworks MINIFS☆13May 18, 2021Updated 4 years ago
- Power line communication through processor load modulation☆12Jul 24, 2017Updated 8 years ago
- ☆10Jun 22, 2017Updated 8 years ago
- ☆12Apr 28, 2024Updated last year
- ☆13Oct 14, 2017Updated 8 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Awesome CV is LaTeX template for your outstanding job application☆14Oct 5, 2025Updated 5 months ago
- copy of original for audit. will be remove soon☆14Mar 6, 2020Updated 6 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".☆13Oct 12, 2018Updated 7 years ago
- You can use ropper to display information about files in different file formats and you can find gadgets to build rop chains for differen…☆12Jun 7, 2018Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- A go client for netgear routers☆16Feb 19, 2023Updated 3 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- A library for reading, manipulating, and writing dex (and odex) files.☆15Apr 11, 2013Updated 12 years ago
- A C library for mutating test cases☆14Oct 14, 2025Updated 4 months ago
- BadProxy is the tool which show a man in middle attack over the internet over the proxy☆10Mar 31, 2018Updated 7 years ago
- Fuzzing compression libraries☆20Jan 10, 2016Updated 10 years ago
- generate pgp keys with vanity fingerprints☆18Dec 20, 2016Updated 9 years ago
- Wordpress AFD dl-skin.php Exploit☆16May 3, 2017Updated 8 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆17Dec 2, 2025Updated 3 months ago
- Simple SS7 SMS Server☆17Dec 22, 2016Updated 9 years ago
- Run TrustZone TAs outside the secure world.☆17Oct 14, 2025Updated 4 months ago
- Slides for Switch Security @ 34C3☆24Dec 31, 2017Updated 8 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago