ringzer0team challange solutions
☆33Jan 15, 2016Updated 10 years ago
Alternatives and similar repositories for ringzer0-challenges
Users that are interested in ringzer0-challenges are comparing it to the libraries listed below
Sorting:
- CTF (Capture The Flag Writeups and Tools)☆54Apr 15, 2019Updated 6 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- hMailServer Password Decrypter☆12Nov 14, 2016Updated 9 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- The Internetwache CTF 2016 repository☆74Mar 28, 2021Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Small util to dump the IDT table of a running OS X system with kmem enabled☆21May 5, 2014Updated 11 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- A cryptographically secure password storage web-utility with distributed consensus using tendermint☆12Dec 19, 2016Updated 9 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- Go package that checks if RSA keys are vulnerable to ROCA / CVE-2017-15361☆16Oct 23, 2017Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- ☆19Aug 13, 2015Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- On the fly TCP and UDP network fuzzer☆16Jan 3, 2020Updated 6 years ago
- A collection of PHP scripts useful for penetration testers working in a PHP environment.☆14Apr 4, 2016Updated 9 years ago
- Solutions to crackmes☆19May 22, 2015Updated 10 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- From telegram bot in command line terminal☆20Oct 15, 2018Updated 7 years ago
- Utilities for creating Burp Suite Extensions.☆21Oct 31, 2024Updated last year
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- Use a local instance of retdec to decompile functions in radare2☆22Dec 3, 2021Updated 4 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- 0CTF 2015 Final web problem☆16Apr 27, 2015Updated 10 years ago
- Scripts for detecting Duqu drivers and other elements☆20Nov 10, 2011Updated 14 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Scans tcl for command injection☆17Mar 8, 2020Updated 5 years ago