This will serve as links to write-ups about solving the challenges on ROOTCON's CTF through the years
☆30Oct 5, 2024Updated last year
Alternatives and similar repositories for ROOTCON-CTF-Writeups
Users that are interested in ROOTCON-CTF-Writeups are comparing it to the libraries listed below
Sorting:
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 12, 2019Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- CTF Team -TeamRocketIST's website source code.☆17Aug 21, 2023Updated 2 years ago
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 4 years ago
- ☆16Apr 24, 2022Updated 3 years ago
- ☆12Mar 10, 2019Updated 6 years ago
- Car Hacking Village Philippines Repository☆44Oct 2, 2025Updated 5 months ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- Tools to help work with bulk data when using Microsoft Purview☆14Updated this week
- Virtual environment for learning DevSecOps☆39Nov 16, 2017Updated 8 years ago
- Get advice for the best post-quantum cryptography algorithm for your use case☆17Updated this week
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- Aftertouch MIDI Glove controller☆11Dec 30, 2012Updated 13 years ago
- ☆10Dec 22, 2017Updated 8 years ago
- PowerCLI Scripts☆14Aug 10, 2019Updated 6 years ago
- ☆16May 13, 2021Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Solutions to our coding challenges!☆10Mar 6, 2021Updated 4 years ago
- GUI / CLI tools & resources used for Capture-The-Flags competitions and Computer Security learning☆12Aug 11, 2021Updated 4 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 8 months ago
- ☆14Mar 28, 2014Updated 11 years ago
- An index of vendors in the MSP space who have published their Vulnerability Disclosure Program and Bug Bounty Programs.☆12Apr 19, 2022Updated 3 years ago
- A curated list of information technology merchandise offerings that benefit original creators and projects☆13May 1, 2025Updated 10 months ago
- Awesome Data Sanitization☆12Jun 6, 2021Updated 4 years ago
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 5 months ago
- ☆10Oct 12, 2021Updated 4 years ago
- This repository contains my work done on the virtual internship provided by Australia's NSW Government on part-time job analysis of the w…☆10Jul 3, 2020Updated 5 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- ☆12Dec 15, 2024Updated last year
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 4 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆11Jul 15, 2024Updated last year
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago