X-CTF 2016 Qualifiers Challenges Source
☆12May 24, 2016Updated 9 years ago
Alternatives and similar repositories for xctf-2016-quals-challenges
Users that are interested in xctf-2016-quals-challenges are comparing it to the libraries listed below
Sorting:
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Ans to the FAQ: How do you self-learn information security?☆29Mar 12, 2018Updated 7 years ago
- Dumping CTF related code here☆17May 3, 2017Updated 8 years ago
- ☆18Aug 26, 2016Updated 9 years ago
- Official homepage for CS3216☆22Mar 11, 2025Updated 11 months ago
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 10 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- React UI for InfoEducatie☆10Jul 29, 2025Updated 7 months ago
- Android lockscreen password cracker via ADB (Tested only on Asus Zenfone 4 A450CG )☆10Jul 3, 2017Updated 8 years ago
- This script checks visa application status using idata.com.tr services in Turkey (for Germany and Italy) and notifies OSX Notification Ce…☆11Jul 9, 2015Updated 10 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- ☆44Oct 22, 2025Updated 4 months ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- dexposed原理学习☆10Sep 1, 2015Updated 10 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- NUS Greyhats CTF101 Web Security Lesson Material☆10Aug 22, 2015Updated 10 years ago
- Bytekit is a PHP extension that provides a userspace representation of the opcodes generated by the Zend engine compiler built into PHP.☆19May 21, 2011Updated 14 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Public release of the sources for SunshineCTF 2017 challenges☆11Oct 31, 2017Updated 8 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- The lecture notes and programs for my class on real analysis. This is very much work in progress!☆12Sep 19, 2021Updated 4 years ago
- PSoC 4 BLE design example repository☆11May 3, 2017Updated 8 years ago
- Hackme is a network security answer platform,Hackme网络安全答题平台☆10Nov 5, 2015Updated 10 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- 基于《操作系统真象还原》实现的64位(AMD64/x86_64)操作系统☆11Nov 11, 2024Updated last year
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago