aadityapurani / My-CTF-ChallengesView external linksLinks
Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions
☆13Oct 7, 2022Updated 3 years ago
Alternatives and similar repositories for My-CTF-Challenges
Users that are interested in My-CTF-Challenges are comparing it to the libraries listed below
Sorting:
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- my talk on defcon26☆20Sep 29, 2018Updated 7 years ago
- A subset of CTF challenges I have made over the years.☆18Aug 4, 2022Updated 3 years ago
- Capture The Flag competition challenge write-ups☆22Jun 10, 2023Updated 2 years ago
- DiceCTF 2021 challenge archive☆22Apr 13, 2021Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Mar 30, 2019Updated 6 years ago
- vm -- code interpreter☆25Apr 8, 2019Updated 6 years ago
- CTF writeups☆30May 27, 2022Updated 3 years ago
- Safe communication between main process and renderer processes in Electron☆26Nov 5, 2015Updated 10 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Jan 27, 2021Updated 5 years ago
- Stuff that should be imprinted in the mind☆34May 16, 2010Updated 15 years ago
- Papers on reverse engineering and assembly language programming☆38Dec 25, 2020Updated 5 years ago
- Slides, exploits and PoCs :)☆94Jan 12, 2019Updated 7 years ago
- My solutions to the problems in the new Codeforces Edu section. All solutions are in Python 3 (Pypy).☆11Jun 13, 2021Updated 4 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- [Course Project, CS 251( 2018-1 ) - IIT Bombay] A secure Personal Cloud storage for files - Web Application( Django)☆10Mar 2, 2020Updated 5 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Write ups for DRDO CTF☆10Jan 13, 2018Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 2 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 5 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- ☆13Sep 10, 2025Updated 5 months ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- Register-based VM as C library☆10Feb 13, 2016Updated 10 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- Python Tools☆14Oct 1, 2020Updated 5 years ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year