Repository with the material of the Tower of Hanoi introductory briefings on binary exploitation
☆24Dec 11, 2015Updated 10 years ago
Alternatives and similar repositories for ctf-training
Users that are interested in ctf-training are comparing it to the libraries listed below
Sorting:
- useful crypto resources for CTF competition.☆19Mar 2, 2019Updated 7 years ago
- Cross-platform CTF problem container manager☆23May 20, 2019Updated 6 years ago
- Solutions for CTFs☆10Dec 29, 2019Updated 6 years ago
- Algorithm study using python day by day☆13Apr 9, 2017Updated 8 years ago
- defcon framework by SeoulPlusBadass☆18Dec 11, 2022Updated 3 years ago
- 어셈블리어를 배워서 써먹자☆21Jun 26, 2018Updated 7 years ago
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- 딥러닝을 이용한 3쿠션 힌트 안드로이드앱(3-Cushion Hint with Deep Learning)☆13Jun 2, 2021Updated 4 years ago
- RDS Extended Support Cost Estimator Script☆15Mar 17, 2025Updated 11 months ago
- ☁️ My Cloud Projects, Docs/Write-ups☆11Jul 8, 2023Updated 2 years ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- A negative testing framework, DoLTEst, for finding non-standard-compliant bugs in LTE protocol implementations of UEs☆40Aug 8, 2022Updated 3 years ago
- Smart contracts for a home rental network with IoT doorlocks☆11Jun 5, 2018Updated 7 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- A balanced unbounded interval-tree in Rust with associated values in the nodes☆13Nov 22, 2022Updated 3 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- ☆14Sep 24, 2012Updated 13 years ago
- noopy - No ops python - is a serverless web framework using AWS Lambda & API Gateway☆11May 9, 2016Updated 9 years ago
- Pipe data straight to an S3 key of your choice☆21Jan 21, 2014Updated 12 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- PoC code for CVE-2019-14041☆13Apr 15, 2020Updated 5 years ago
- create buckets for terraform tfstate files and set cross-region replication.☆12Sep 17, 2017Updated 8 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- Supporting repository for the talk on DDD implementation feedback with Node☆11Jul 12, 2017Updated 8 years ago
- ☆11Dec 3, 2014Updated 11 years ago
- Terrarium: An Open Source implementation of the Terraform registry☆19Oct 23, 2025Updated 4 months ago
- ☆16Sep 6, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Configure an LDAPS Endpoint for Simple AD☆14Aug 29, 2017Updated 8 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- [WIP] pivot a running process into an emulator for instrumentation☆13Aug 12, 2016Updated 9 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year