b01lers / welcome-to-ctfView external linksLinks
A small repo to host b01lers' outline of what CTF is and how to get into it.
☆34Apr 21, 2021Updated 4 years ago
Alternatives and similar repositories for welcome-to-ctf
Users that are interested in welcome-to-ctf are comparing it to the libraries listed below
Sorting:
- ☆21Oct 16, 2020Updated 5 years ago
- RE / Binary Exploitation Resources☆74Dec 1, 2017Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- ☆18Mar 26, 2024Updated last year
- ☆23Feb 3, 2021Updated 5 years ago
- Harekaze mini CTF 2020 challenges☆17Dec 27, 2020Updated 5 years ago
- OLE Package Format Documentation☆22Jun 13, 2020Updated 5 years ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- ☆29Nov 22, 2023Updated 2 years ago
- NTFS samples☆27Aug 1, 2020Updated 5 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago
- ☆35Jan 27, 2025Updated last year
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Aug 28, 2020Updated 5 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- ☆31Mar 26, 2023Updated 2 years ago
- 試試你的好手氣☆41Jan 26, 2026Updated 3 weeks ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- Example scripts using angr☆48Jan 26, 2026Updated 3 weeks ago
- ☆38Aug 28, 2018Updated 7 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Mar 26, 2022Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- Emoji Favicon Toolkit - Set your favicon to emoji using canvas & cache as /favicon.ico with service workers☆16Mar 16, 2019Updated 6 years ago