OJ / police-questLinks
Binary exploitation CTF challenge
☆24Updated 7 years ago
Alternatives and similar repositories for police-quest
Users that are interested in police-quest are comparing it to the libraries listed below
Sorting:
- Testing/collecting some container breakouts☆94Updated 6 years ago
- POLAR☆74Updated 6 years ago
- Red Team Resources☆60Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 5 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Slides from various talks that I've given over the years☆118Updated 2 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- ☆147Updated 9 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year
- An extensible honeypot framework☆96Updated 3 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆91Updated last year
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- ☆122Updated 7 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- ☆90Updated 8 years ago
- ☆57Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆101Updated 2 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago