Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions
☆13Oct 7, 2022Updated 3 years ago
Alternatives and similar repositories for My-CTF-Challenges
Users that are interested in My-CTF-Challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Capture The Flag competition challenge write-ups☆22Mar 1, 2026Updated 3 weeks ago
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- [Course Project, CS 251( 2018-1 ) - IIT Bombay] A secure Personal Cloud storage for files - Web Application( Django)☆10Mar 2, 2020Updated 6 years ago
- Apriori algorithm implementation☆14Feb 2, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- DiceCTF 2021 challenge archive☆22Apr 13, 2021Updated 4 years ago
- The notes are the supplement to papers and handouts of CS 259D☆21May 4, 2018Updated 7 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- CTF writeups☆30May 27, 2022Updated 3 years ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Jan 27, 2021Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- ☆13Sep 10, 2025Updated 6 months ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- vm -- code interpreter☆25Apr 8, 2019Updated 6 years ago
- Slides, exploits and PoCs :)☆94Jan 12, 2019Updated 7 years ago
- ☆10Nov 23, 2021Updated 4 years ago
- A curated list of blogs, videos, tutorials, code, tools, scripts, and anything useful to help you learn Azure Policy - by @JesseLoudon☆13Jan 20, 2022Updated 4 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 6 years ago
- Safe communication between main process and renderer processes in Electron☆26Nov 5, 2015Updated 10 years ago
- my talk on defcon26☆20Sep 29, 2018Updated 7 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A subset of CTF challenges I have made over the years.☆18Aug 4, 2022Updated 3 years ago
- Papers on reverse engineering and assembly language programming☆38Dec 25, 2020Updated 5 years ago
- PowerShell interpreter for unmanaged (non CLI) C++ projects☆16Jul 19, 2017Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Chrome extension to detect possible xsleaks☆12May 4, 2019Updated 6 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Training materials for Security Camp 2020 (B7), a state-sponsored security education event in Japan☆14Oct 4, 2021Updated 4 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Build connected security experiences. Starting point to share code, libraries, notebooks, workbooks, and queries for connected experience…☆26Apr 14, 2024Updated last year
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆20Jul 8, 2020Updated 5 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Register-based VM as C library☆11Feb 13, 2016Updated 10 years ago
- Stuff that should be imprinted in the mind☆34May 16, 2010Updated 15 years ago