OverTheWireOrg / OverTheWire-websiteLinks
OverTheWire website
☆1,124Updated 2 weeks ago
Alternatives and similar repositories for OverTheWire-website
Users that are interested in OverTheWire-website are comparing it to the libraries listed below
Sorting:
- CTF Field Guide☆1,396Updated last year
- Hack Night is an open weekly training session run by the OSIRIS lab.☆1,265Updated last year
- Wiki-like CTF write-ups repository, maintained by the community. 2014☆1,854Updated 9 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,630Updated 7 years ago
- A general collection of information, tools, and tips regarding CTFs and similar security competitions☆1,806Updated 4 years ago
- Challenges for Binary Exploitation Workshop☆625Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,002Updated 3 years ago
- A collection of cheatsheets for various infosec tools and topics.☆814Updated 4 years ago
- Pentest environment deployer (kali linux + targets) using vagrant and chef.☆641Updated 6 years ago
- Collection of free books, papers and articles related to CTF challenges.☆383Updated 6 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆917Updated 8 years ago
- the main hackademic code repository☆323Updated 5 years ago
- A place to discuss potential projects for students of the ISIS Lab.☆383Updated 12 years ago
- CTF write-ups from the VulnHub CTF Team☆715Updated 7 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,116Updated 3 years ago
- A modern vulnerable web app☆1,011Updated 4 years ago
- 👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets…☆213Updated last week
- An in depth tutorial on how to do binary exploitation☆452Updated 7 years ago
- Linux Exploit Suggester; based on operating system release number☆1,806Updated 11 years ago
- Mellivora is a CTF engine written in PHP☆453Updated last year
- Software to identify the different types of hashes -☆1,428Updated 3 years ago
- Material for the YouTube series☆510Updated 3 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,878Updated 3 years ago
- A set of security related tools☆679Updated 4 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆785Updated 5 years ago
- Create randomly insecure VMs☆2,716Updated last month
- Automatically exported from code.google.com/p/unix-privesc-check☆1,076Updated 4 years ago
- The Hacker's Sandbox☆124Updated 6 months ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆276Updated 5 years ago
- Dirty COW☆3,422Updated 6 years ago