RandomsCTF / ctf-scriptsLinks
A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments
☆10Updated 9 years ago
Alternatives and similar repositories for ctf-scripts
Users that are interested in ctf-scripts are comparing it to the libraries listed below
Sorting:
- Exploit Reliability Testing System☆34Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- ☆43Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Various tools, exploits and other short code snippets☆12Updated 6 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Athc0n 2012 CTF setups☆15Updated 10 years ago
- Configuration security audit framework☆21Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Updated 8 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Vulnerability research and development.☆25Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago