Personal repository for all ctf related stuffs
☆67Nov 9, 2024Updated last year
Alternatives and similar repositories for grayrepo
Users that are interested in grayrepo are comparing it to the libraries listed below
Sorting:
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- ☆12Jul 27, 2020Updated 5 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆14Aug 6, 2013Updated 12 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Jun 23, 2017Updated 8 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- ☆92Aug 18, 2024Updated last year
- Linux kASLR (Intel TSX/RTM) bypass static library☆79Oct 15, 2017Updated 8 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- a pwn demo for easy manage a pwn server☆25Aug 3, 2016Updated 9 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- GryphonCTF 2016 Challenges Repository.☆17Sep 30, 2017Updated 8 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆24Oct 10, 2019Updated 6 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- IDA Pro resources, scripts, and configurations☆167Feb 23, 2026Updated last week
- A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security In…☆52Jul 2, 2019Updated 6 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago