brian020305 / Christmas-CTFView external linksLinks
Open-CTF based on Christmas CTF Platform
☆11Feb 25, 2016Updated 9 years ago
Alternatives and similar repositories for Christmas-CTF
Users that are interested in Christmas-CTF are comparing it to the libraries listed below
Sorting:
- A Data Visualization of Box Office History.☆18Mar 24, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- 어셈블리어를 배워서 써먹자☆21Jun 26, 2018Updated 7 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- An Open Sourced CTF hosting platform written in php☆10May 24, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- ☆32May 16, 2018Updated 7 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- ASP.NET HashDoS PoC Payload☆24Jan 6, 2012Updated 14 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- ☆17Jun 3, 2025Updated 8 months ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 2 months ago
- collection of translation documents.☆16Mar 31, 2019Updated 6 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 9 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- A fuzzing library that allows creating malicious payloads based on Joi validator schemas.☆14Apr 20, 2015Updated 10 years ago
- ☆16Nov 16, 2015Updated 10 years ago