Writeups for various CTFs
☆17Nov 20, 2018Updated 7 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- A writeup summary for CTF problems.☆25Jul 17, 2016Updated 9 years ago
- 苍穹 - 贴吧签到助手☆10Oct 3, 2014Updated 11 years ago
- Some loader module for IDA☆35Feb 21, 2017Updated 9 years ago
- A Offset Tester That can Test Offset For All kind Of Game☆15Jul 28, 2022Updated 3 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- Homebrew walking simulator for Nintendo DS☆12Dec 3, 2022Updated 3 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Hardware repo for the Transparent Graphical OLED☆12Mar 5, 2019Updated 6 years ago
- MPU-6050 Accelerometer and Gyroscope code☆11Aug 4, 2014Updated 11 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- Python bindings for Shimple/Jimple IR from Soot.☆43Feb 5, 2026Updated 3 weeks ago
- An implementation of memcpy for amd64 with clang/gcc☆15Feb 7, 2022Updated 4 years ago
- Hardware random number generator for FPGAs☆10May 7, 2015Updated 10 years ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- This library provides an example code to get the temperature and humidity from the AHT20 sensor.☆11Jan 8, 2025Updated last year
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 12 years ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 10 months ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- My Interview recording repo.☆11Mar 22, 2023Updated 2 years ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- NES implementation using SystemVerilog (WIP)☆12Aug 26, 2025Updated 6 months ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Pentest TeamCity using Metasploit☆45Feb 8, 2021Updated 5 years ago
- PDBHeaderGenerator is a program used to analyze Microsoft Debug Information (PDB) files and generate C++ headers from them describing the…☆17Sep 30, 2024Updated last year
- A customized version of Ella used in the paper `An Empirical Study of Android Test Generation Tools in Industrial Cases`.☆10Aug 19, 2020Updated 5 years ago
- Binary Ninja Plugin for RISC-V☆14Nov 29, 2023Updated 2 years ago
- ☆13Sep 15, 2024Updated last year
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- Unofficial Android remote control app for Euro Truck Simulator 2 (ETS2) / American Truck Simulator (ATS)☆10Mar 16, 2022Updated 3 years ago
- hq2x scaling algorithm updated to support RGBA☆17Jan 14, 2016Updated 10 years ago