Neg9 / OpenCTF-2019
DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9
☆20Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for OpenCTF-2019
- DEFCON 27 slides and workshop materials.☆128Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 4 years ago
- ☆54Updated 4 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆59Updated 3 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆16Updated 5 years ago
- Python template to assist with buffer overflows☆70Updated 5 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆39Updated 4 years ago
- Day long class on packet analysis☆9Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆38Updated 4 years ago
- OSEE Preparation☆170Updated 5 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 2 years ago
- 👹☆57Updated 3 years ago
- Git repo for challenges of encryptCTF 2019☆21Updated 5 years ago
- A repo to support the book☆103Updated 3 years ago
- Collection of OSCP study material && tools.☆77Updated 5 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 3 months ago
- ☆27Updated 4 years ago
- List of Repositories☆94Updated 3 years ago
- Scripts to execute enumeration via LFI☆88Updated 5 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆72Updated 4 years ago
- Post exploitation helper☆37Updated last year
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆139Updated 3 years ago
- Shell Please 1.0 : Reverse shell code generator.☆35Updated 2 years ago
- ☆23Updated 4 years ago