Small cyber challenges for fun and no profit
☆12May 20, 2025Updated 11 months ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open-source implementations of reference Physical True Random Number Generators (TRNG or PTRNG) based on ring oscillators.☆16Mar 26, 2026Updated last month
- Secbench is an open-source framework for hardware security characterization☆22Jan 15, 2026Updated 3 months ago
- IOPMP IP☆25Jul 11, 2025Updated 9 months ago
- Private git repository manager☆21Jul 21, 2015Updated 10 years ago
- ASLR Disabler (x86 / x64) - Little utility for disabling the ASLR on PE files☆18Aug 1, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆11Apr 5, 2019Updated 7 years ago
- crypto-condor is a Python library for compliance testing of implementations of cryptographic primitives☆32Apr 8, 2026Updated 3 weeks ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Cube World Reversing & Cheat (x64) - Include IDA file and unpacked game☆13Aug 1, 2023Updated 2 years ago
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- Explore illusionsec DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, …☆35Jan 13, 2026Updated 3 months ago
- Rust API for the STM32F0 micro controller☆18Aug 7, 2018Updated 7 years ago
- Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters☆14Oct 1, 2025Updated 7 months ago
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Pour découvrir le Gherkin, rien de tel que de le modéliser et de mettre les yeux dans le code !☆13Mar 14, 2021Updated 5 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 9 months ago
- Port of MIT's xv6 OS to 32 bit RISC V☆12Feb 12, 2023Updated 3 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- Edit, preview and share mermaid charts/diagrams.☆12Nov 7, 2019Updated 6 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 5 years ago
- OpenCCA: An Open Framework to Enable Arm CCA Research☆22Sep 10, 2025Updated 7 months ago
- BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect☆11May 21, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An open silicon CHERIoT Ibex microcontroller chip☆18May 23, 2025Updated 11 months ago
- Archive of the official Microsoft VibeVoice repository (7B & 1.5B). Backup of the deleted source code for the open-source TTS models, inc…☆35Sep 5, 2025Updated 7 months ago
- Script PowerShell☆12Jan 16, 2022Updated 4 years ago
- OpenMZ, a security kernel for RISC-V targeting secure coprocessors and secure embedded systems.☆14Jun 26, 2020Updated 5 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆23Jun 12, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆85Nov 10, 2025Updated 5 months ago
- OFDM implementation for GNURadio using UHD☆12Sep 27, 2011Updated 14 years ago
- Tutoriel de prise en main de Cucumber : Recette aux concombres pour débutant.☆11Aug 30, 2018Updated 7 years ago
- In Detail Methodology of How I perform Web Pentesting☆10Oct 18, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- OSCP Study Guide 2023 - All tools and notes you will need!☆16Jan 11, 2023Updated 3 years ago
- This tool automates and facilitates an AES CBC BitFlip attack☆21Jan 17, 2024Updated 2 years ago
- ☆18Feb 27, 2025Updated last year
- RISC-V Security HC admin repo☆17Jan 7, 2025Updated last year
- A testbed for RISCV vulnerable binaries that aims to produce meaningful fingerprints recognizable by a Control Flow integrity Machine Lea…☆18Mar 1, 2024Updated 2 years ago
- Empty project to quick start Proof of Concept app development☆34Feb 15, 2025Updated last year
- Ensemble-HackTools is an awesome collection of hacking tools.☆28May 8, 2024Updated last year