hugsy / ctfhubView external linksLinks
Where CTFs happen
☆82May 30, 2024Updated last year
Alternatives and similar repositories for ctfhub
Users that are interested in ctfhub are comparing it to the libraries listed below
Sorting:
- ☆11Nov 25, 2020Updated 5 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.☆26Mar 15, 2022Updated 3 years ago
- Interface GDB-GEF with Binary Ninja☆59Mar 27, 2021Updated 4 years ago
- ☆64Jul 23, 2024Updated last year
- Challenge handouts, source code, and solutions for UofTCTF 2026☆35Jan 13, 2026Updated last month
- IDA (sort of) headless☆27Feb 17, 2024Updated last year
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆591Feb 5, 2026Updated last week
- CTFd Theme for StormCTF (Updated a little bit for the newest version of CTFd)☆12May 19, 2019Updated 6 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- go-bssid-geolocator☆14Mar 19, 2025Updated 10 months ago
- redpwn's challenge deployment system☆28Dec 22, 2023Updated 2 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 7 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆13Jan 30, 2023Updated 3 years ago
- ☆10Sep 1, 2021Updated 4 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- ☆14May 30, 2018Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- Solutions to Flare-On 10 CTF☆14Nov 11, 2023Updated 2 years ago
- Challenges from pbctf 2020☆34Dec 16, 2020Updated 5 years ago
- Open KLara Project☆34Updated this week
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Jun 12, 2023Updated 2 years ago
- Shellcode Spider of Exploit-DB☆11Oct 17, 2017Updated 8 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features☆171Jun 9, 2025Updated 8 months ago
- my goto docker image when playing ctfs with all the tools I need☆21Jan 29, 2026Updated 2 weeks ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Aug 19, 2022Updated 3 years ago
- A personalised Spotify quiz based on the music you listen to☆15Mar 24, 2021Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago