Vector35 / defcon2015-livectf
Challenges from the DEF CON 2015 Finals Live CTF
☆14Updated 9 years ago
Alternatives and similar repositories for defcon2015-livectf:
Users that are interested in defcon2015-livectf are comparing it to the libraries listed below
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Hack In Paris 2018 Slideware☆17Updated 6 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Updated 6 years ago
- ☆13Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- ☆13Updated 7 years ago
- ☆20Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- A collection of shellcodes☆68Updated 12 years ago
- ☆20Updated last year
- ☆20Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Some setup scripts for security research tools.☆10Updated 9 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- ☆10Updated 3 months ago
- Repository for proxenet plugins☆14Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago