☆17Jan 10, 2025Updated last year
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- This repository is deprecated. See 02h.shawnd.xyz instead.☆16Aug 28, 2023Updated 2 years ago
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆70Jul 5, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- python to tax form compiler☆13Jun 6, 2022Updated 3 years ago
- Efficient C implementation of Differential Fault Analysis on AES (round 1, 2, 8 or 9)☆32Apr 22, 2026Updated last week
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆39Jul 13, 2023Updated 2 years ago
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆15May 24, 2022Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- Better marker component ergonomics with the Bevy Engine☆10Aug 15, 2022Updated 3 years ago
- Upload of all challenges from idekCTF 2022☆25Jan 20, 2023Updated 3 years ago
- Make your domain weird, but still works :/☆93Jan 4, 2023Updated 3 years ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- WeCTF 2021 Source Code & Organizer's Writeup☆26Jul 25, 2021Updated 4 years ago
- Multiple serialization/deserialization implementations for the same type.☆13Feb 22, 2025Updated last year
- ☆28Nov 18, 2021Updated 4 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Lyrics plugin for AIMP music player☆13Dec 6, 2022Updated 3 years ago
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- WeCTF 2022 Source Code & Organizer's Writeup☆33Jun 12, 2022Updated 3 years ago
- Description of 4 sketch style (4SKST) dataset☆13May 19, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆41Jan 13, 2026Updated 3 months ago
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- CTF challenges I've written☆36Apr 20, 2023Updated 3 years ago
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Notion C2 Profile for Mythic☆45Updated this week
- PWNable pyjail☆13Jan 13, 2025Updated last year
- VulnReach builds on standard SCA output by adding reachability context - proving through static analysis, taint tracking, and live runtim…☆20Apr 27, 2026Updated last week
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14May 26, 2022Updated 3 years ago
- ☆11Sep 1, 2023Updated 2 years ago
- Anyone can contribute in any domain! An open-source repository to contribute Learning Resources. Contribute to this repository as a part …☆10Dec 7, 2020Updated 5 years ago