Athc0n 2012 CTF setups
☆15Mar 12, 2015Updated 10 years ago
Alternatives and similar repositories for athcon-ctf
Users that are interested in athcon-ctf are comparing it to the libraries listed below
Sorting:
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆22Mar 17, 2014Updated 11 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Python bindings for Intel's XED☆33Jul 1, 2024Updated last year
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Anti-technique Codes, Detection of Anti-technique codes☆38Oct 27, 2013Updated 12 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- 딥러닝을 이용한 3쿠션 힌트 안드로이드앱(3-Cushion Hint with Deep Learning)☆13Jun 2, 2021Updated 4 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- Constraint solver based on abstract interpretation☆10Dec 20, 2024Updated last year
- ☆12Aug 24, 2014Updated 11 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Homemade scripts to-do various vulnerable challenges☆79Jan 7, 2021Updated 5 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 5 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 3 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Datasets and code for the paper entitled "A Multi-Channel Software Decoder for the LoRa Modulation Scheme".☆12Dec 22, 2017Updated 8 years ago
- Code generator for binary parsing☆19Feb 1, 2020Updated 6 years ago