A small repo to host b01lers' outline of what CTF is and how to get into it.
☆33Apr 21, 2021Updated 5 years ago
Alternatives and similar repositories for welcome-to-ctf
Users that are interested in welcome-to-ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RE / Binary Exploitation Resources☆73Dec 1, 2017Updated 8 years ago
- Harekaze mini CTF 2020 challenges☆16Dec 27, 2020Updated 5 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Aug 28, 2020Updated 5 years ago
- This project is no longer maintained☆13May 10, 2020Updated 5 years ago
- ☆10May 3, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- ☆11Sep 20, 2021Updated 4 years ago
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 6 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Creating a Bind Shell in C☆20Aug 21, 2023Updated 2 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Public release files for b01lers-ctf☆43Dec 12, 2022Updated 3 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- CTF writeups☆12Aug 10, 2020Updated 5 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- Example scripts using angr☆48Jan 26, 2026Updated 3 months ago
- Repo for collecting part of my public CTF challenges☆44Mar 25, 2024Updated 2 years ago
- ☆24Feb 3, 2021Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Find RSA primes in files☆20May 14, 2022Updated 3 years ago
- ARM Exploit 開発のためのトレーニングリポジトリ☆19May 23, 2020Updated 5 years ago
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- LERN GHIDRA☆95Aug 14, 2025Updated 8 months ago
- ☆23Jul 18, 2023Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Apr 21, 2022Updated 4 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Challenge Repository for CSAW CTF Quals 2019☆56Mar 2, 2026Updated last month
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- ☆29Nov 22, 2023Updated 2 years ago
- 🚩 framework for kernel memory exploitation (WIP)☆22Jul 22, 2025Updated 9 months ago
- Challenges I've made for public CTFs.☆22Sep 30, 2025Updated 6 months ago