flawwan / CTF-Candy
Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.
☆66Updated 6 years ago
Alternatives and similar repositories for CTF-Candy:
Users that are interested in CTF-Candy are comparing it to the libraries listed below
- All CTF events☆74Updated 3 years ago
- notes and code on past CTFs☆103Updated 3 years ago
- Writeups of Capture The Flag Competitions☆121Updated 2 years ago
- Writeups/solutions☆95Updated 5 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- CTF writeups☆30Updated 2 years ago
- ☆109Updated 2 years ago
- Writeup for the challenges in NahamCon CTF 2020☆81Updated 4 years ago
- VoidHack CTF write-ups☆59Updated 6 years ago
- Writeups for all the HTB machines I have done☆62Updated last year
- Upcoming list of ctfs directly in your terminal!☆16Updated 2 years ago
- Useful tips by OTA CTF members☆140Updated 5 years ago
- Pwning notes☆47Updated 8 months ago
- CLI tool to get the links of original writeups from ctftime.org☆32Updated 5 years ago
- Detailed writeups of how I solved infosec Capture The Flag (CTF) challenges☆48Updated 4 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- Web Exploitation Workflow for CTF Challenges☆49Updated 8 years ago
- ☆26Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆59Updated last year
- List of Trusted Types bypasses☆92Updated last year
- Stego Helper Identification Tool☆26Updated 6 years ago
- Password-protected writeups of HTB platform (challenges and boxes) https://cesena.github.io/☆21Updated 3 years ago
- My writeups of various CTFs & security challenges☆71Updated 10 months ago
- PoC for leaking text nodes via CSS injection☆36Updated 6 years ago
- A CTF framework to create, build, deploy and monitor challenges☆113Updated 6 months ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆215Updated last year
- ☆63Updated 8 months ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competition☆101Updated 4 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆75Updated 6 years ago
- justCTF 2019 challenges sources☆37Updated 3 years ago