Writeups for CTF that took place in 2015.
☆13Mar 22, 2016Updated 10 years ago
Alternatives and similar repositories for WU-2015
Users that are interested in WU-2015 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IRMA ansible☆24Nov 28, 2016Updated 9 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- bSidesLisbon 2016 event contents☆10Dec 14, 2016Updated 9 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Saturn – Free Grav Theme, is a beautiful cosmic website template. Customize it easily and add your own creative touch. Designed by Afniz…☆10Jan 15, 2021Updated 5 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Apr 19, 2023Updated 2 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆24Jun 6, 2023Updated 2 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- IRMA frontend☆25Nov 28, 2016Updated 9 years ago
- IRMA probe☆25Nov 28, 2016Updated 9 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- Pluggable bot for Slack☆22Aug 6, 2014Updated 11 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Malice VirusTotal Plugin☆12Feb 24, 2019Updated 7 years ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 9 months ago
- Repository contenant les aides-mémoires ESD academy☆20Apr 5, 2020Updated 5 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- a keep-alive agent for node http & https with a really snappy name☆32May 2, 2017Updated 8 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Bro Live! A Bro training/learning environment.☆14Jul 21, 2015Updated 10 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- ☆16Mar 10, 2017Updated 9 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- ☆16May 9, 2016Updated 9 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Latest copy of Sysinternals from live.sysinternals.com☆18Mar 25, 2014Updated 12 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- ☆11Mar 30, 2017Updated 8 years ago
- a grep -r for secrets☆179May 4, 2022Updated 3 years ago
- Dockerized cve-search as a web app☆16Dec 18, 2017Updated 8 years ago