☆34Aug 9, 2022Updated 3 years ago
Alternatives and similar repositories for ctf_writeup
Users that are interested in ctf_writeup are comparing it to the libraries listed below
Sorting:
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- Toy project for static analysis of ELF binaries☆29Jun 24, 2017Updated 8 years ago
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 3 months ago
- ☆19Dec 28, 2021Updated 4 years ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆10Jan 31, 2019Updated 7 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- GATEKEEPER: Inline and on-target defense☆123Sep 1, 2022Updated 3 years ago
- Python Time Based Authentication Attack Tool☆21Apr 20, 2021Updated 4 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- 知乎日报RSS版☆22Apr 12, 2016Updated 9 years ago
- A crappy tool used in our private PS4 jailbreak☆99Oct 27, 2016Updated 9 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆50Dec 31, 2023Updated 2 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- Python module wrapping Bindiff usage into a Python API.☆22Jan 20, 2026Updated last month
- ☆13Jul 31, 2020Updated 5 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Simple Simulator of ARMv6m instructions☆17May 23, 2017Updated 8 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Hacking on ESR's ctopy the C to Python conversion tool: http://www.catb.org/~esr/ctopy/☆14May 20, 2012Updated 13 years ago
- 3D Accelerated Exploitation☆54Feb 22, 2019Updated 7 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- IDA Pro plugin to view Exports☆17Sep 21, 2018Updated 7 years ago
- Some loader module for IDA☆35Feb 21, 2017Updated 9 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago