NCTF 2023 challenges and writeups
☆15Dec 30, 2023Updated 2 years ago
Alternatives and similar repositories for NCTF2023
Users that are interested in NCTF2023 are comparing it to the libraries listed below
Sorting:
- javaweb的流量监控脚本,基于filter,也有jar版本,那天曹佬说它就取名叫拉普拉斯的流量女仆(java_Laplace_Fluid_Maid)好了☆11Aug 8, 2023Updated 2 years ago
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆17Dec 19, 2025Updated 2 months ago
- ☆27Jun 7, 2022Updated 3 years ago
- 2023 第六届安洵杯 题目环境/源码☆13Dec 25, 2023Updated 2 years ago
- 之前方便自己研究RASP原理和绕过时顺手写的,用于快速启动和重置RASP环境☆71Oct 13, 2024Updated last year
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 6 months ago
- 更适合中国Misc手体质的套题生成器☆22Sep 18, 2023Updated 2 years ago
- 第七届西湖论剑·中国杭州网络安全技能大赛 初赛 赛题存档☆24Jan 30, 2024Updated 2 years ago
- Writeups By Straw Hat☆54Dec 14, 2023Updated 2 years ago
- 一个IDEA插件:一键收集项目中所有jar包依赖的工具插件。遍历项目目录收集所有jar文件,复制到all-in-one文件夹,并自动添加为项目库。☆50Oct 30, 2025Updated 4 months ago
- 青少年CTF基础Docker镜像☆29Aug 4, 2024Updated last year
- A lab to help you learning SSTI☆121Aug 30, 2023Updated 2 years ago
- Java bytecode line number restoration tool☆134Aug 31, 2025Updated 6 months ago
- javaDeserializeLabs☆70Apr 18, 2023Updated 2 years ago
- ☆95Sep 2, 2024Updated last year
- 一些总结出来的gadget的flow,后续合适和加入新的flow☆66Dec 6, 2025Updated 3 months ago
- 2023 陇剑杯 线上初赛附件☆32Aug 30, 2024Updated last year
- 抽离出 utf-8-overlong-encoding 的序列化逻辑,实现 2 3 字节加密序列化数组☆140Mar 11, 2024Updated last year
- 用于自动搜索 Python 沙箱逃逸、SSTI 攻击链的小工具☆37Jan 22, 2025Updated last year
- A simplified pwntools for SageMath.☆11Dec 23, 2025Updated 2 months ago
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆13Nov 9, 2022Updated 3 years ago
- ☆11Sep 6, 2024Updated last year
- Implementation of Lenstra-Lenstra-Lovász lattice basis reduction algorithm in Rust☆14Feb 24, 2022Updated 4 years ago
- 《Web安全教程之XXE漏洞》XML External Entity Injection.☆11Nov 1, 2025Updated 4 months ago
- MSIEVE: A Library for Factoring Large Integers☆14Apr 7, 2023Updated 2 years ago
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated 11 months ago
- Awesome LLM for Cybersecurity☆11Nov 16, 2024Updated last year
- Null-free shellcode for running calc.exe on Windows x64☆13Mar 24, 2024Updated last year
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- ☆15Sep 2, 2024Updated last year
- ☆15Aug 27, 2020Updated 5 years ago
- Apache Shiro CVE-2022-32532☆13Jun 28, 2022Updated 3 years ago
- TLE for avoiding TLE☆10Sep 12, 2022Updated 3 years ago
- 禅道研发项⽬管理系统sql注入漏洞☆13Jan 16, 2023Updated 3 years ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- Work-in-progress tool to dump Swift types from a Mach-o☆12Sep 24, 2024Updated last year
- ARP断网攻击☆11Jun 25, 2023Updated 2 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago