Writeups for CTF that took place in 2015.
☆13Mar 22, 2016Updated 9 years ago
Alternatives and similar repositories for WU-2015
Users that are interested in WU-2015 are comparing it to the libraries listed below
Sorting:
- ☆15Apr 9, 2018Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- bSidesLisbon 2016 event contents☆10Dec 14, 2016Updated 9 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- Example project demonstrating some kind of OpenSSL certificate pinning. Related to blogpost at TKTK showing how to bypass such pinning.☆19Jan 2, 2015Updated 11 years ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 8 months ago
- My write ups - Capture the flag challanges☆19Nov 18, 2022Updated 3 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Jun 16, 2012Updated 13 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- IRMA ansible☆24Nov 28, 2016Updated 9 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- Install and configure user mode auditd tools☆34Feb 17, 2026Updated 2 weeks ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN☆29Jul 22, 2017Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆24Jun 6, 2023Updated 2 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Hide JavaScript inside your GIF and BMP images☆28Aug 23, 2015Updated 10 years ago
- ☆26May 7, 2018Updated 7 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 9 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Word 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.☆96Dec 10, 2018Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago