hackthebox / cyber-apocalypse-2025View external linksLinks
Official writeups for Cyber Apocalypse CTF 2025: Tales from Eldoria
β193Apr 1, 2025Updated 10 months ago
Alternatives and similar repositories for cyber-apocalypse-2025
Users that are interested in cyber-apocalypse-2025 are comparing it to the libraries listed below
Sorting:
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royaleβ217Dec 4, 2024Updated last year
- π΅ Official source code and writeups for SekaiCTF 2025!β122Aug 20, 2025Updated 5 months ago
- Source for challenges from bi0sCTFβ49Jun 15, 2025Updated 7 months ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploitsβ24Oct 20, 2025Updated 3 months ago
- A collection of pyjails!β27Dec 15, 2025Updated last month
- Smart and efficient tool to automate open redirect detection at scale.β10Mar 21, 2022Updated 3 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024β14Oct 24, 2024Updated last year
- Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Examβ61Apr 30, 2023Updated 2 years ago
- β112Apr 22, 2025Updated 9 months ago
- β13Mar 12, 2022Updated 3 years ago
- PEDA - Python Exploit Development Assistance for GDBβ13Jul 13, 2024Updated last year
- POC Pdf-exploit builder on C#β13Mar 1, 2024Updated last year
- Challenges for ImaginaryCTF 2025β25Sep 7, 2025Updated 5 months ago
- e2e Scanning research moduleβ22Jun 30, 2025Updated 7 months ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...β16Dec 6, 2024Updated last year
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575β96Nov 14, 2024Updated last year
- Challenges for ImaginaryCTF 2024β34Sep 5, 2025Updated 5 months ago
- β35May 26, 2023Updated 2 years ago
- WaniCTF 2024 official writeup & source codeβ14Jun 26, 2024Updated last year
- tricks I discovered while playing king of the hillβ17Jun 28, 2023Updated 2 years ago
- CTF Writeups Backupβ13Nov 4, 2024Updated last year
- A toolkit for cryptanalysis using lattices.β137Dec 2, 2023Updated 2 years ago
- NeXSS is a modern, self-hosted Blind XSS (Cross-Site Scripting) hunter and callback listener built with Next.js. It helps security researβ¦β30Jan 14, 2026Updated last month
- β16Mar 26, 2023Updated 2 years ago
- Hack The Box CPTS, CWES, CDSA, CWEE, CAPE, CJCA Exam and Lab Reporting / Note-Taking Toolβ335Jan 30, 2026Updated 2 weeks ago
- This project was initially developed with my classmate for a school course, but as we grew more enthusiastic about it, we decided to contβ¦β23Jun 21, 2024Updated last year
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.β18Sep 21, 2023Updated 2 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.β125Aug 20, 2018Updated 7 years ago
- Useful scripts from past CTF challengesβ43Sep 21, 2025Updated 4 months ago
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've doneβ803Nov 18, 2025Updated 2 months ago
- β15Jan 30, 2026Updated 2 weeks ago
- VulnBox is a container that is intentionally designed with vulnerabilities to allow security professionals to practice and improve their β¦β17Aug 23, 2024Updated last year
- β82Jun 17, 2025Updated 7 months ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivβ¦β49Jan 16, 2025Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends eβ¦β26Sep 25, 2023Updated 2 years ago
- Challenges and write-ups for GCC-CTF 2024β18Mar 3, 2024Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.β19Feb 18, 2024Updated last year
- β23Jun 10, 2024Updated last year
- Tiny and fast port scanner (Sliver edition)β26Mar 7, 2025Updated 11 months ago