Preparation of Attack & Defense CTF for iHack 2022
☆16Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for iHack-Attack-Defense
Users that are interested in iHack-Attack-Defense are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Learn how to intercept flutter apps☆25Jan 19, 2024Updated 2 years ago
- Telegrip is a digital forensic tool that provides acquistion and analysis for Telegram-related cases.☆19May 11, 2022Updated 3 years ago
- This repository contains all my decoding bash/python3 scripts I wrote while sloving CTFs (Cryptography) Challenge. I hope you find them h…☆11Dec 5, 2023Updated 2 years ago
- A JavaScript clock imitating Nixie tubes.☆10Feb 22, 2019Updated 7 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The updated website for b01lers CTF!☆13Apr 4, 2026Updated 2 weeks ago
- A Simple CTFd Plugin that will act as a flag generator and validator☆13Nov 23, 2023Updated 2 years ago
- My CTF Challenge☆12Feb 5, 2026Updated 2 months ago
- Automated tool implementing Hash Length Extension Attack in MD4,MD5,SHA1,SHA256,SHA512 along with an example☆25Nov 16, 2024Updated last year
- Hard fork of mcguinness/saml-idp; a local SAML Identity Provider (IdP) library to test SAML 2.0 Service Providers (SPs).☆11Oct 8, 2024Updated last year
- Getting into Hack The Box can be difficult. Let's make it a little bit easier.☆17Nov 21, 2024Updated last year
- CSF Firewall and AbuseIPDB API integration with specific focus on data privacy and prevention of sensitive data leaked to public AbuseIPD…☆16Mar 20, 2024Updated 2 years ago
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- ☆14Jul 11, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- My mobile writeups repository☆29Nov 19, 2025Updated 4 months ago
- The Dumb Network Fuzzer☆21Jul 18, 2023Updated 2 years ago
- Browser-based Android security auditing tool.☆71Mar 29, 2026Updated 3 weeks ago
- ☆13Oct 13, 2018Updated 7 years ago
- Swift playground teaching basics of buffer overflow vulnerability and ARM64 assembly by exploiting vulnerable app on ARM64 emulator (WWDC…☆13May 24, 2022Updated 3 years ago
- ☆24Jan 27, 2026Updated 2 months ago
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 4 years ago
- Defending against malicious USB firmware in the Linux kernel☆16Mar 8, 2016Updated 10 years ago
- This repository houses a collection of my earlier coding projects. I hope that you will find these contributions valuable and informative…☆16May 13, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- Patches needed to build VMware (Player and Workstation) host modules against recent kernels☆17Sep 20, 2025Updated 6 months ago
- ☆25Apr 29, 2025Updated 11 months ago
- ☆20Dec 10, 2020Updated 5 years ago
- ☆15Jul 28, 2024Updated last year
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- All the lab manuals, tasks and their solutions for the course CY243 - Penetration Testing along with a Teacher's manual for Lab Setup wil…☆16Feb 5, 2024Updated 2 years ago
- Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!☆17Jan 28, 2022Updated 4 years ago
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆27Mar 5, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Attack-defense CTF training organized by dtl on 23 Jul, 2023☆12Jul 24, 2023Updated 2 years ago
- A collection of (mostly) technical things every software developer should know☆13May 30, 2018Updated 7 years ago
- Materials from the CS Level-Up trainers☆11Aug 10, 2025Updated 8 months ago
- This repository is for the Testing ASP.NET ViewState with YSoNet (YSoSerial.NET) workshop.☆23Dec 17, 2025Updated 4 months ago
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- The standard ADB Configuration involves a USB Connection to a physical Device. If you prefer, you can switch over to TCP/IP Mode and conn…☆19Nov 4, 2023Updated 2 years ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆26Jun 10, 2025Updated 10 months ago