Challenge files which are deployed in the container for the user
☆25May 24, 2024Updated last year
Alternatives and similar repositories for yookiterm-challenges-files
Users that are interested in yookiterm-challenges-files are comparing it to the libraries listed below
Sorting:
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- ☆15Sep 19, 2019Updated 6 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- Study and research with your docs, media, and AI in one place☆34Updated this week
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 3 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Jun 28, 2022Updated 3 years ago
- ☆13Nov 5, 2024Updated last year
- A keygen for Specter Insight C2☆47Feb 17, 2025Updated last year
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- ☆19Jan 15, 2026Updated last month
- Tool for advanced mining for content on Github☆28Nov 11, 2025Updated 3 months ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase☆67Aug 7, 2025Updated 7 months ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Get metadata about the active window (title, id, bounds, owner, etc)☆11Oct 27, 2025Updated 4 months ago
- ☆10Jan 17, 2022Updated 4 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago
- IDA plugin for YARA signature creation☆19Nov 30, 2025Updated 3 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- BookWorm: A Dataset for Character Description and Analysis [EMNLP Findings 2024]☆14Feb 28, 2025Updated last year
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- The repository for papaer "Distance between Relevant Information Pieces Causes Bias in Long-Context LLMs"☆14Dec 16, 2024Updated last year
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- ☆14Jan 10, 2025Updated last year
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- A minimal Linux that runs as a coreboot or LinuxBoot ROM payload to provide a secure, flexible boot environment for laptops and servers.☆13Apr 7, 2022Updated 3 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- ☆13Nov 24, 2021Updated 4 years ago