Repository For CTF Write-ups
☆17Sep 11, 2023Updated 2 years ago
Alternatives and similar repositories for CTF-Write-Ups
Users that are interested in CTF-Write-Ups are comparing it to the libraries listed below
Sorting:
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Given a kind of unknown encoding and the result of encoding, using this framework, we can crack and get the original text☆20Jan 24, 2018Updated 8 years ago
- Golang Port Knocking for Linux + Windows☆18Feb 22, 2022Updated 4 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- Hands-on labs to help you learn AWS☆25Dec 1, 2017Updated 8 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- ☆10Oct 28, 2018Updated 7 years ago
- Writeups from CTFs I've done in the past☆24Nov 15, 2016Updated 9 years ago
- 参赛所用的sshop平台☆11Jun 26, 2018Updated 7 years ago
- The Internetwache CTF 2016 repository☆74Mar 28, 2021Updated 4 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Just another tool to download specify Symbol (.pdb) files☆39Sep 4, 2019Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- Goss CIS Benchmark tests☆13Apr 12, 2021Updated 4 years ago
- zygotebench - benchmark process creation speed on Android☆14Dec 4, 2013Updated 12 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- This is example code for a Rabin-Williams public-key signature scheme designed to provide high speed verification and small signatures.☆16Oct 9, 2008Updated 17 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- ☆44Dec 23, 2014Updated 11 years ago
- Run commands on linux through those pesky firewalls☆30Jul 21, 2015Updated 10 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 8 months ago
- TrueCrypt ported to wxWidgets 3.0, and some patches to build a 64-bit version on OS X.☆15Dec 5, 2015Updated 10 years ago
- Virtualization detection through speculative execution PoCs and papers☆69May 22, 2018Updated 7 years ago
- An example Windows 10 UMDF driver for the sole purpose of sending MMIO to BAR regions of an FPGA☆21May 4, 2018Updated 7 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago