hgarrereyn / Th3g3ntl3man-CTF-WriteupsView external linksLinks
Th3g3ntl3man CTF Writeups
☆22Sep 17, 2018Updated 7 years ago
Alternatives and similar repositories for Th3g3ntl3man-CTF-Writeups
Users that are interested in Th3g3ntl3man-CTF-Writeups are comparing it to the libraries listed below
Sorting:
- Writeups for Pico CTF 2017 capture the flag hacking compeition☆14Mar 21, 2018Updated 7 years ago
- Send WiFi credentials over audio to a "thing"☆28Oct 26, 2018Updated 7 years ago
- A simple library to interface with Gwiot 7941E RFID reader☆11Nov 2, 2020Updated 5 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆34Sep 3, 2021Updated 4 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- ☆14Dec 7, 2022Updated 3 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Upload "Oshwi" Badge for OshwDem 2017 a Coruña☆10May 26, 2018Updated 7 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- ☆10May 10, 2019Updated 6 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- (Currently untested) minimal STM32WB board. These look cool because they have a bluetooth / 802.15.4 radio and an internal switching powe…☆10Feb 25, 2020Updated 5 years ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- Code for the Arduino networking book published by PacktPub. The book is about using the Arduino Ethernet shield for networking & IoT appl…☆12Aug 20, 2015Updated 10 years ago
- ICP and ISP Programmer libraries for the Nuvoton NuMicro 8051 line of MCUs (N76E003, MS51FB9AE, etc.)☆16Apr 7, 2024Updated last year
- Embedded facial recognition system involving PYNQ board, Webcam, and HDMI output.☆11May 10, 2018Updated 7 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- Reject membrane, embrace monke☆10Jan 7, 2022Updated 4 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 2 years ago
- ☆12Jan 27, 2026Updated 3 weeks ago
- Only hosting https://doc.sagemath.org/ files. Updates to the documentation must be made with PRs to https://github.com/sagemath/sage, not…☆12Dec 27, 2025Updated last month
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- This repository contains static builds of Qt for Windows that are compatible with Bitcoin Core.☆11Sep 4, 2021Updated 4 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- CANoolder: CAN to 3.3V logic level interface. Dumb. Cheap. Simple. Pick 3.☆15Feb 14, 2018Updated 8 years ago
- Challenges and official solutions for SINF CTF 2020 (companion CTF of SINF, for students, which I organized by myself)☆13Nov 11, 2020Updated 5 years ago
- A library that you can use to build spiking neural network brains for your Arduino robots! Largely allows you to follow the paradigms of …☆10Nov 21, 2015Updated 10 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆111Aug 7, 2017Updated 8 years ago