various programing challenges
☆51Dec 8, 2025Updated 3 months ago
Alternatives and similar repositories for programming-challenges
Users that are interested in programming-challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF (Capture The Flag Writeups and Tools)☆54Apr 15, 2019Updated 6 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆21Feb 27, 2016Updated 10 years ago
- A selection of challenges created for UMDCTF 2017☆23Oct 26, 2019Updated 6 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- X-CTF 2016 Qualifiers Challenges Source☆12May 24, 2016Updated 9 years ago
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 6 years ago
- A-Frame gradient sky component☆27Jan 29, 2017Updated 9 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- WiFi Scanner and Default WPS PIN Generator for Livebox 2.1 and Lievbox Next from Orange (Spain)☆22Oct 5, 2021Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- A simple steganalysis script writen in Python☆26Dec 12, 2013Updated 12 years ago
- Guide to buffer overflows☆59Sep 3, 2021Updated 4 years ago
- (mostly web related) web challenge writeups between 2011 and 2015☆21Jan 17, 2023Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆18Jun 11, 2019Updated 6 years ago
- Reverse/ Bind Shell Generator for cross platform systems☆17Sep 2, 2018Updated 7 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- Tools for analyzing hexagon code☆39Jun 22, 2016Updated 9 years ago
- Pour nos write ups de CTF ou Rhacklettes party☆23May 6, 2019Updated 6 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆194Jun 25, 2015Updated 10 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 8 years ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆10Jan 31, 2019Updated 7 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- ringzer0team challange solutions☆33Jan 15, 2016Updated 10 years ago
- exerl☆16Feb 12, 2025Updated last year
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 11 years ago
- ☆13Apr 27, 2021Updated 4 years ago
- A repo on all things pentesting for highly secure environments.☆11Apr 24, 2016Updated 9 years ago
- ☆22Oct 24, 2016Updated 9 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- A few scripts to tweak the gnome 3 ui. xdotool required.☆10Dec 14, 2017Updated 8 years ago
- Docker container for use with Multi-layer Recurrent Neural Networks (LSTM, GRU, RNN) for character-level language models in Torch☆10Jan 19, 2019Updated 7 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- The hottest login theme around for KDE Plasma 5☆14Nov 12, 2018Updated 7 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year