A small repo to host b01lers' outline of what CTF is and how to get into it.
☆33Apr 21, 2021Updated 4 years ago
Alternatives and similar repositories for welcome-to-ctf
Users that are interested in welcome-to-ctf are comparing it to the libraries listed below
Sorting:
- ☆21Oct 16, 2020Updated 5 years ago
- RE / Binary Exploitation Resources☆73Dec 1, 2017Updated 8 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- ☆18Mar 26, 2024Updated last year
- ☆23Feb 3, 2021Updated 5 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- NTFS samples☆27Aug 1, 2020Updated 5 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago
- ☆34Jan 27, 2025Updated last year
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- 試試你的好手氣☆41Jan 26, 2026Updated last month
- Completely strips digital signatures from executables (.exe, .dll, .sys, .drv...) and fixes issues preventing resigning☆17Oct 19, 2025Updated 4 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Example scripts using angr☆48Jan 26, 2026Updated last month
- ☆38Aug 28, 2018Updated 7 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Mar 26, 2022Updated 3 years ago
- opsi-script aka. opsi-winst and other various tools.☆10Mar 3, 2026Updated last week
- ☆16Apr 24, 2023Updated 2 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year