书籍《极限黑客攻防CTF赛题揭秘》的随书示例代码
☆14Dec 18, 2020Updated 5 years ago
Alternatives and similar repositories for CTF-Book-Resource
Users that are interested in CTF-Book-Resource are comparing it to the libraries listed below
Sorting:
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- Simple read/write and commentable config files for go☆11Jul 2, 2016Updated 9 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- Get started on the PicoCalc using the Pico-Series C/C++ SDK.☆28Jan 31, 2026Updated last month
- ☆12Aug 12, 2016Updated 9 years ago
- A set of additional PHPStan rules used in Oro products.☆13Feb 2, 2026Updated last month
- x64_dbg SDK version 010 in Delphi☆15Feb 7, 2021Updated 5 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- Flu visualization tool☆10Mar 9, 2017Updated 8 years ago
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- Redis based IP blacklist and limit for Nginx☆12Jun 16, 2016Updated 9 years ago
- ☆13Jul 11, 2024Updated last year
- ☆12Aug 29, 2025Updated 6 months ago
- Nền tảng server nhỏ nhắn, dễ thương :*☆15Jul 31, 2015Updated 10 years ago
- Some IR notes☆17Jul 2, 2016Updated 9 years ago
- ☆14Jul 1, 2025Updated 8 months ago
- ☆12Oct 29, 2015Updated 10 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Extracts files and information from Parrot firmware files.☆15Jan 4, 2017Updated 9 years ago
- Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only☆13Aug 22, 2021Updated 4 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆19Jun 2, 2022Updated 3 years ago
- PTT and/or automatic bandswitching a XIEGU-PA with ICOM IC-705 via Bluetooth using an ESP32 LILYGO TTGO T-Display v1.1☆18Jan 22, 2025Updated last year
- A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.☆15Aug 4, 2021Updated 4 years ago
- Rover Satellite Communications Protocol is a protocol for communicating with a rover over a serial connection. This project is designed f…☆21Jul 21, 2025Updated 7 months ago
- Documentation of vmc☆16Mar 4, 2025Updated 11 months ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- The MITRE ATT&CK Mapping Datasets☆19Jan 23, 2024Updated 2 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Dec 7, 2022Updated 3 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago