Ptcoresec jeopardy style scoreboard
☆23Jul 17, 2012Updated 13 years ago
Alternatives and similar repositories for ptcoresec-scoreboard-ctf
Users that are interested in ptcoresec-scoreboard-ctf are comparing it to the libraries listed below
Sorting:
- scoreserver web application for CTF(Capture The Flag)☆24Aug 3, 2022Updated 3 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Jan 8, 2017Updated 9 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Totally legitimate☆11May 15, 2019Updated 6 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ☆13Jan 5, 2017Updated 9 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- Automatizated bash script to invade WPA2 networks with wordlist method☆18Apr 8, 2019Updated 6 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- Chrome Extension for XSS Hunter Payloads☆42Sep 7, 2016Updated 9 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- Using simple seccomp filters☆26Aug 5, 2012Updated 13 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- ☆24Feb 6, 2017Updated 9 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 7 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- 어셈블리어를 배워서 써먹자☆21Jun 26, 2018Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- This repository contains additional files mentioned in the blog post☆22Feb 26, 2019Updated 7 years ago