apuigsech / vagrant-ctf
Vagrant files to bootstrap VM for CTFs
☆11Updated 8 years ago
Alternatives and similar repositories for vagrant-ctf:
Users that are interested in vagrant-ctf are comparing it to the libraries listed below
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 3 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- js-beautifier extension for Burp Suite☆30Updated 11 years ago
- ☆12Updated 8 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Application Security library☆11Updated 12 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- ☆21Updated 5 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 6 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- finals-2014☆21Updated 8 years ago
- A Modern Approach☆10Updated 9 years ago
- ☆8Updated 4 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆26Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago
- Memory awesomeness.☆29Updated 9 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Vulnerability research and development.☆25Updated 9 years ago