☆89Jun 3, 2018Updated 7 years ago
Alternatives and similar repositories for ctf-training
Users that are interested in ctf-training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 20, 2021Updated 5 years ago
- An advanced command-line search engine for Exploit-DB☆16Sep 30, 2021Updated 4 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- [Forked] This repo is for learning various heap exploitation techniques.☆10Sep 6, 2018Updated 7 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Write-ups of the challenges on pwnable.kr☆21Nov 9, 2020Updated 5 years ago
- CTF write-ups by Plaid Parliament of Pwning☆805Jun 4, 2024Updated last year
- Dockerized setup for quick pwning☆23Mar 2, 2021Updated 5 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Stuff that should be imprinted in the mind☆34May 16, 2010Updated 15 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- ☆10Jun 2, 2021Updated 4 years ago
- CLI tool to get the links of original writeups from ctftime.org☆31Mar 22, 2020Updated 6 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- Public Repo for the source code of the UDCTF in 2022☆12Nov 7, 2022Updated 3 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- ☆43Dec 2, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- Small python module for common CTF crypto functions☆168Aug 28, 2022Updated 3 years ago
- For Linux binary Exploitation☆847Mar 26, 2018Updated 8 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- ☆16Apr 24, 2023Updated 2 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Apr 7, 2015Updated 10 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆963Mar 14, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Writeups of CTF challenges☆32Sep 30, 2020Updated 5 years ago
- My writeups of various CTFs & security challenges☆73Oct 15, 2025Updated 5 months ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆66Sep 23, 2017Updated 8 years ago
- ☆111Dec 30, 2019Updated 6 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Jun 28, 2024Updated last year