Vagrant files to bootstrap VM for CTFs
☆11Aug 21, 2016Updated 9 years ago
Alternatives and similar repositories for vagrant-ctf
Users that are interested in vagrant-ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆72Nov 27, 2018Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Feb 14, 2025Updated last year
- Exploit Android MSM8974 Chipset☆14Aug 20, 2015Updated 10 years ago
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- kCFI Documentation☆15Apr 18, 2017Updated 8 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- BSidesVienna Homepage☆16Mar 4, 2026Updated 3 weeks ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- ProxMate for chrome☆12Oct 21, 2019Updated 6 years ago
- ☆11May 30, 2021Updated 4 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 4 years ago
- Enhanced code highlighting using highlight.js for Hexo☆17Oct 20, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- Public presentations given on Frida at conferences☆102Aug 18, 2019Updated 6 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- An in progress learning kernel for x86.☆14Sep 18, 2017Updated 8 years ago
- Crackme collections☆14May 24, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- League of Legends Friend List Exporter using League Client API (LCU)☆11Feb 2, 2019Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆16May 15, 2020Updated 5 years ago
- Online test is available 👉☆12Mar 17, 2026Updated last week
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago