X1cT34m / NCTF2023View external linksLinks
NCTF 2023 challenges and writeups
☆15Dec 30, 2023Updated 2 years ago
Alternatives and similar repositories for NCTF2023
Users that are interested in NCTF2023 are comparing it to the libraries listed below
Sorting:
- javaweb的流量监控脚本,基于filter,也有jar版本,那天曹佬说它就取名叫拉普拉斯的流量女仆(java_Laplace_Fluid_Maid)好了☆11Aug 8, 2023Updated 2 years ago
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆16Dec 19, 2025Updated last month
- ☆27Jun 7, 2022Updated 3 years ago
- 2023 第六届安洵杯 题目环境/源码☆13Dec 25, 2023Updated 2 years ago
- 之前方便自己研究RASP原理和绕过时顺手写的,用于快速启动和重置RASP环境☆71Oct 13, 2024Updated last year
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 5 months ago
- 更适合中国Misc手体质的套题生成器☆22Sep 18, 2023Updated 2 years ago
- 第七届西湖论剑·中国杭州网络安全技能大赛 初赛 赛题存档☆24Jan 30, 2024Updated 2 years ago
- Writeups By Straw Hat☆54Dec 14, 2023Updated 2 years ago
- 一个IDEA插件:一键收集项目中所有jar包依赖的工具插件。遍历项目目录收集所有jar文件,复制到all-in-one文件夹,并自动添加为项目库。☆50Oct 30, 2025Updated 3 months ago
- 青少年CTF基础Docker镜像☆29Aug 4, 2024Updated last year
- A lab to help you learning SSTI☆120Aug 30, 2023Updated 2 years ago
- Java bytecode line number restoration tool☆134Aug 31, 2025Updated 5 months ago
- javaDeserializeLabs☆70Apr 18, 2023Updated 2 years ago
- ☆94Sep 2, 2024Updated last year
- 2023 陇剑杯 线上初赛附件☆32Aug 30, 2024Updated last year
- 一些总结出来的gadget的flow,后续合适和加入新的flow☆66Dec 6, 2025Updated 2 months ago
- 抽离出 utf-8-overlong-encoding 的序列化逻辑,实现 2 3 字节加密序列化数组☆139Mar 11, 2024Updated last year
- 用于自动搜索 Python 沙箱逃逸、SSTI 攻击链的小工具☆37Jan 22, 2025Updated last year
- ☆33Dec 6, 2019Updated 6 years ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- ☆10Sep 6, 2024Updated last year
- A simplified pwntools for SageMath.☆11Dec 23, 2025Updated last month
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆13Nov 9, 2022Updated 3 years ago
- all of CTF☆40Jan 24, 2022Updated 4 years ago
- LuaN1ao (鸾鸟) is an autonomous penetration testing agent based on state awareness and causal reasoning.☆224Jan 15, 2026Updated last month
- Null-free shellcode for running calc.exe on Windows x64☆13Mar 24, 2024Updated last year
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated 10 months ago
- Implementation of Lenstra-Lenstra-Lovász lattice basis reduction algorithm in Rust☆14Feb 24, 2022Updated 3 years ago
- 《Web安全教程之XXE漏洞》XML External Entity Injection.☆11Nov 1, 2025Updated 3 months ago
- Awesome LLM for Cybersecurity☆11Nov 16, 2024Updated last year
- MSIEVE: A Library for Factoring Large Integers☆14Apr 7, 2023Updated 2 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 7 months ago
- 禅道研 发项⽬管理系统sql注入漏洞☆13Jan 16, 2023Updated 3 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 8 months ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 2 months ago
- ARP断网攻击☆11Jun 25, 2023Updated 2 years ago
- distorm3☆12Jun 16, 2012Updated 13 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 4 months ago