OJ / police-questLinks
Binary exploitation CTF challenge
☆24Updated 6 years ago
Alternatives and similar repositories for police-quest
Users that are interested in police-quest are comparing it to the libraries listed below
Sorting:
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago
- ☆122Updated 7 years ago
- Red Team Resources☆60Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- POLAR☆73Updated 6 years ago
- ☆57Updated 5 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Big Iron Recon & Pwnage☆126Updated 3 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- ☆89Updated 7 years ago
- ☆144Updated 8 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 8 months ago
- ☆25Updated 8 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 6 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 5 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago