OJ / police-quest
Binary exploitation CTF challenge
☆24Updated 6 years ago
Alternatives and similar repositories for police-quest:
Users that are interested in police-quest are comparing it to the libraries listed below
- Material from our CANAPE workshop☆32Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- POLAR☆73Updated 6 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- Scoring Engine for CTF competitions☆46Updated 2 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 4 months ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- ☆29Updated 8 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- CANAPE Network Testing Tool☆33Updated 6 years ago
- I'll post my custom shellcode I make here!☆22Updated 5 years ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 7 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- ☆55Updated 4 years ago
- WhiteBox CMS analysis☆69Updated last year
- Pull author and committer names and emails from Travis-CI☆11Updated 4 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- ☆25Updated 2 weeks ago