Dump of codes for the challenges I attempted / solved in various Capture the Flag challenges. Not intended to be very tidy and clean.
☆33Sep 16, 2019Updated 6 years ago
Alternatives and similar repositories for My-CTF-Solutions
Users that are interested in My-CTF-Solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hosted challenges for our CTF events☆14Aug 24, 2023Updated 2 years ago
- Write ups to the CTF problems online.☆14Mar 17, 2022Updated 4 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Source files and writeups for UTCTF 2019☆14Oct 21, 2020Updated 5 years ago
- ☆10Nov 19, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- ☆10Jun 11, 2018Updated 7 years ago
- WebEngineering Project☆13Nov 16, 2011Updated 14 years ago
- eJPT CheatSheet☆28Feb 4, 2021Updated 5 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- ☆19Jan 19, 2026Updated 4 months ago
- CTF writeups by ./Vespiary☆15Nov 12, 2023Updated 2 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- All Write-up pushed by RasyidMF. This repository is created for private or public learning purposes☆10Oct 16, 2020Updated 5 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- Accelerated execution for fast Windows fuzzing☆25Jan 9, 2025Updated last year
- A extension for collecting parameters☆24Oct 25, 2020Updated 5 years ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- Small python module for common CTF crypto functions☆168Aug 28, 2022Updated 3 years ago
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Oct 25, 2021Updated 4 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- Writeups/solutions☆104Feb 25, 2020Updated 6 years ago
- ☆16Jul 3, 2025Updated 10 months ago
- A P2P network security monitoring system for the Ethereum blockchain.☆15Aug 7, 2024Updated last year
- CTF scripts and writeups (mostly challenge + .py solving script)☆24Oct 27, 2025Updated 6 months ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Jul 17, 2024Updated last year
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- API resep masakan bahasa indonesia☆11Jan 22, 2021Updated 5 years ago
- ☆11Feb 23, 2025Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆18Mar 14, 2025Updated last year
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆43May 15, 2026Updated last week
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Jan 21, 2021Updated 5 years ago