Official writeups for Hack The Boo CTF 2023
☆45Dec 4, 2024Updated last year
Alternatives and similar repositories for htboo-ctf-2023
Users that are interested in htboo-ctf-2023 are comparing it to the libraries listed below
Sorting:
- Official writeups for Business CTF 2024: The Vault Of Hope☆159Dec 4, 2024Updated last year
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆218Dec 4, 2024Updated last year
- PinterCoding University. Author : Gun Gun Febrianza☆11Jun 27, 2020Updated 5 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆105Dec 4, 2024Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 9 months ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- ☆11Feb 6, 2023Updated 3 years ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- ☆16Oct 30, 2022Updated 3 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- CTFs solve scripts☆20Jan 9, 2026Updated last month
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- This repository is an interactive collection of my solutions to various XSS challenges.☆13Oct 25, 2020Updated 5 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- This repository contains the mobile Proof of Concept (POC) tester for CTF challenges. The POC tester is a web application that allows use…☆20Oct 3, 2025Updated 5 months ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Mar 8, 2023Updated 2 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Apr 16, 2025Updated 10 months ago
- ☆59Oct 24, 2024Updated last year
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- purplestorm writeup collection☆29Feb 21, 2026Updated last week
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- A tech enumeration toolkit focused on 404 Not found pages.☆27Oct 6, 2024Updated last year
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 8 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Generate Proxy DLLs in Rust☆48Updated this week
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆23Oct 19, 2019Updated 6 years ago
- A simple PDF summarizer with Node.js and groq-sdk☆11Jan 11, 2025Updated last year
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆202Sep 11, 2025Updated 5 months ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated 3 weeks ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆33Jul 12, 2022Updated 3 years ago
- ☆30Sep 20, 2023Updated 2 years ago
- A set of helper scripts, to be used with jlib to help parsing domains.☆27Oct 21, 2020Updated 5 years ago
- ☆31Sep 23, 2022Updated 3 years ago