A .net Crackme Challenge made for the SecTalks Brisbane 2017 Capture the Flag Event. Writeup/solution included.
☆22Oct 2, 2017Updated 8 years ago
Alternatives and similar repositories for cracknet
Users that are interested in cracknet are comparing it to the libraries listed below
Sorting:
- Python modules which provide a suite of useful utilities for CTFs☆11Nov 1, 2019Updated 6 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- DO NOT USE: this is a vulnerable ASP.NET web app using Razor templating engine. The vulnerability is a Server-Side Template Injection (SS…☆28Aug 22, 2020Updated 5 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- Image steganography demo☆24Oct 4, 2022Updated 3 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- Damn Vulnerable Web Application (DVWA) Vagrant Box for testing☆14Jun 23, 2016Updated 9 years ago
- The DjangoCon US 2017 conference website☆12Nov 14, 2024Updated last year
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Nov 15, 2019Updated 6 years ago
- A simple cross-platform script for encoding any binary file into a lossless PNG.☆17Aug 12, 2024Updated last year
- Umbrella project for various ESP8266 programs☆15Aug 16, 2018Updated 7 years ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆10Jan 31, 2019Updated 7 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- A document laying out the vision for Aletheia☆15Nov 24, 2019Updated 6 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Apr 10, 2018Updated 7 years ago
- python specific evil text objects for emacs☆12Feb 8, 2022Updated 4 years ago
- ☆10May 22, 2023Updated 2 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Jun 22, 2020Updated 5 years ago
- ☆13Aug 22, 2022Updated 3 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- PowerShell Obfuscator☆11Jul 21, 2022Updated 3 years ago
- Repositories, Links, Payloads, Blogs, Tools, etc.. which I think might be useful for pentesting and bug bounty☆49Jan 6, 2026Updated 2 months ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Feb 21, 2022Updated 4 years ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- A DNP3 parser implementation in Hammer☆15Mar 10, 2016Updated 10 years ago
- A memory scanner for Wesnoth that allows you to search, filter, and edit memory inside the process.☆25Nov 16, 2021Updated 4 years ago
- The DjangoCon US 2016 conference website☆12Jan 14, 2017Updated 9 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆13Aug 16, 2022Updated 3 years ago
- Ruby Bind and Reverse Shells I wrote using standard libs. Bind Shell includes authentication while reverse does not. Standard libs only s…☆12Aug 2, 2013Updated 12 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- ☆16Jul 14, 2024Updated last year
- This is a simple bot which automatically log you in to your scheduled meeting. So there will be no more hassle for you to join any meetin…☆12Apr 23, 2021Updated 4 years ago
- scrape prices from Amazon☆11Apr 17, 2016Updated 9 years ago