havce / beginnerCTF-2022Links
First edition of the annual beginner CTF by havce.
☆13Updated 2 years ago
Alternatives and similar repositories for beginnerCTF-2022
Users that are interested in beginnerCTF-2022 are comparing it to the libraries listed below
Sorting:
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Updated 4 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆23Updated 4 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆67Updated 4 years ago
- Tools for ESP32 firmware dissection☆53Updated 2 months ago
- random dissectors☆68Updated 2 years ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆29Updated last year
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 3 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Advanced: Bluetooth low energy capture the flag☆63Updated 2 years ago
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆58Updated 6 years ago
- ☆65Updated 2 years ago
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- An arduino UARTFuzzer☆48Updated 3 years ago
- Still point in moving world.☆49Updated 3 years ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆23Updated 8 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- ☆15Updated last year
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- ☆47Updated 5 years ago
- ☆50Updated 3 weeks ago
- Diebold Accuvote-TSx Election Machine Hacking☆40Updated 5 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆92Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 4 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- decode bits into bytes☆45Updated 5 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago