cgvwzq / ctf_tasksView external linksLinks
CTF tasks created
☆11Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for ctf_tasks
Users that are interested in ctf_tasks are comparing it to the libraries listed below
Sorting:
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆29Jan 11, 2026Updated last month
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Various documentation and write-ups for challenges and research☆12Sep 26, 2019Updated 6 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Jan 20, 2026Updated 3 weeks ago
- ☆14Jul 8, 2019Updated 6 years ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 8 months ago
- ☆17Aug 3, 2021Updated 4 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- HN Security's advisories.☆22Nov 7, 2025Updated 3 months ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Mar 6, 2018Updated 7 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- ☆26Aug 6, 2021Updated 4 years ago
- ☆28Oct 4, 2021Updated 4 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Tool for test XSS vulnerabilities of a site☆18Apr 1, 2018Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆36Feb 16, 2024Updated last year
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- A command line tool and a library to generate TLS certificates for development purposes.☆36Jul 5, 2021Updated 4 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 6 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- Telegram (v4.9.155353) was rendering file:// links + opening them via NSWorkspace.open -> code execution.☆36Dec 8, 2019Updated 6 years ago
- ☆32Jan 24, 2016Updated 10 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Automated management of ad campaigns in Google Display&Video 360.☆14Updated this week
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- ☆78Feb 19, 2017Updated 8 years ago
- ☆36Apr 1, 2021Updated 4 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Jul 27, 2021Updated 4 years ago
- A repository with simple projects created for testing/learning purpose☆46Dec 18, 2025Updated last month
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Collection of slides☆33Aug 20, 2025Updated 5 months ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago