W3rni0 / NahamCon_CTF_2020View external linksLinks
Writeup for the challenges in NahamCon CTF 2020
☆80Aug 3, 2020Updated 5 years ago
Alternatives and similar repositories for NahamCon_CTF_2020
Users that are interested in NahamCon_CTF_2020 are comparing it to the libraries listed below
Sorting:
- A python script to hide information over an audio file in .wav format☆19Oct 7, 2017Updated 8 years ago
- Some wrrite-ups☆18Feb 28, 2025Updated 11 months ago
- Write and execute PHP with only 6 different characters: ([.^])☆19Sep 5, 2021Updated 4 years ago
- ☆25Dec 8, 2020Updated 5 years ago
- ☆13Feb 7, 2020Updated 6 years ago
- CopyToAsm (x64) - A Plugin For x64dbg☆31Jul 17, 2018Updated 7 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Install any apk into dual app space☆27Jan 28, 2022Updated 4 years ago
- ☆18Sep 6, 2023Updated 2 years ago
- Encode, Decode and Crack encoded data, useful to crack some random encoded strings in CTFs.☆20Jun 25, 2024Updated last year
- Quixotic Color Scheme for Papirus Icons☆19Aug 16, 2022Updated 3 years ago
- De4dot MOD with few unpackers added☆14Oct 11, 2016Updated 9 years ago
- ctf solutions☆81Apr 2, 2024Updated last year
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- Run CTF challenges with netcat in one docker container.☆40Aug 5, 2023Updated 2 years ago
- Code and notes for the 2021 HackTheBox Business CTF☆37Jul 25, 2021Updated 4 years ago
- Offical Writeups for n00bzCTF2023☆22Jun 15, 2023Updated 2 years ago
- Twin-Hex Cipher Encoder/Decoder☆21Jul 23, 2023Updated 2 years ago
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA H…☆10Aug 1, 2023Updated 2 years ago
- Repository for writeups of ctf challenges☆11Jan 28, 2024Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- View emails in Discord using Cloudflare Email Routing☆10Dec 15, 2023Updated 2 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- Simple GUI app to simplify manual string decryption with de4dot☆27Jan 25, 2022Updated 4 years ago
- Trace a program using CPU tracer technology.☆27Nov 9, 2022Updated 3 years ago
- All challenges from DiceCTF 2023☆74Feb 6, 2023Updated 3 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- Writeup for the challenges in Really Awesome CTF 2020☆13Aug 3, 2020Updated 5 years ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- Security Advisories☆35Feb 8, 2026Updated last week
- Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only☆13Aug 22, 2021Updated 4 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack …☆18Apr 8, 2024Updated last year
- Implementation of known practical attack on some AES variant☆16Apr 3, 2024Updated last year
- Repository to store summaries of CTF challenges☆28Aug 26, 2023Updated 2 years ago
- Write-ups to CTF challenges☆30Apr 9, 2021Updated 4 years ago
- de4dot fixed to handle "anti-de4dot" interface adder☆33Jun 6, 2020Updated 5 years ago
- This repository collects lists of security-relavent Python APIs, along with examples of exploits using those APIs☆36May 9, 2021Updated 4 years ago