☆25Dec 8, 2020Updated 5 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- ☆26Apr 23, 2021Updated 4 years ago
- Repository for writeups of ctf challenges☆11Jan 28, 2024Updated 2 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Implementation of known practical attack on some AES variant☆16Apr 3, 2024Updated last year
- ☆16Apr 12, 2023Updated 2 years ago
- CTF challenges from redpwnCTF 2021☆31Jul 13, 2021Updated 4 years ago
- CTF challenges from redpwnCTF 2020☆60Sep 4, 2020Updated 5 years ago
- ☆18Sep 27, 2020Updated 5 years ago
- Writeup for the challenges in NahamCon CTF 2020☆80Aug 3, 2020Updated 5 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- ☆23Dec 30, 2019Updated 6 years ago
- ☆31Jan 31, 2026Updated last month
- The official challenges and deployment source code files used in San Diego CTF 2022.☆28May 14, 2022Updated 3 years ago
- Stego Helper Identification Tool☆27Nov 12, 2018Updated 7 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆29Nov 20, 2021Updated 4 years ago
- SwiftLake: Java SQL engine built on Apache Iceberg and DuckDB for efficient lakehouse reads and writes☆30Aug 13, 2025Updated 6 months ago
- ☆27May 25, 2022Updated 3 years ago
- A repository of all challenges featured in the RaRCTF 2021 Capture The Flag.☆33Sep 21, 2021Updated 4 years ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- public archive for corCTF 2022☆37Aug 16, 2022Updated 3 years ago
- Complex multiplication based factorization☆40Feb 21, 2022Updated 4 years ago
- All Write-up pushed by RasyidMF. This repository is created for private or public learning purposes☆10Oct 16, 2020Updated 5 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- The Dynamic Rules Engine is a serverless application that enables real-time evaluation of rules against sensor data, leveraging AWS Kines…☆11Sep 25, 2024Updated last year
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Fast threaded padding oracle attack automation script for Python 3.☆38Nov 25, 2023Updated 2 years ago
- Server-side component of the Vault PKI certificate distribution system.☆15Jun 27, 2020Updated 5 years ago
- tool to send packet using "gopacket".☆11Aug 11, 2017Updated 8 years ago
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- A brainfuck interpreter using only the C preprocessor☆91Aug 3, 2024Updated last year
- Python Tools☆14Oct 1, 2020Updated 5 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆37Jan 13, 2026Updated last month
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy☆14Oct 23, 2024Updated last year
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- Solution descriptions for all the problems on foreverCTF☆11Aug 12, 2024Updated last year