infosec-ucalgary / magpieCTF-2021
Challenges and other resources for magpieCTF 2021.
☆19Updated 2 years ago
Alternatives and similar repositories for magpieCTF-2021:
Users that are interested in magpieCTF-2021 are comparing it to the libraries listed below
- Challenges and other resources for magpieCTF 2022.☆16Updated 2 years ago
- Learn Binary Exploitation with sample problems and solutions☆130Updated 2 years ago
- A useful wordlist made from French Canadian leaked passwords!☆66Updated 3 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- Reverse engineering basics in puzzle form☆180Updated 4 years ago
- A collection of write-ups and solutions for Cyber FastTrack Spring 2021.☆48Updated 3 years ago
- A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers☆235Updated this week
- Example reports from prior years of the Collegiate Penetration Testing Competition☆138Updated 8 months ago
- Writeup for the DEF CON 30 badge challenge☆70Updated 2 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Updated 4 years ago
- Automate writeup for vulnerable machines.☆40Updated last year
- Git repo for challenges of encryptCTF 2019☆23Updated 5 years ago
- CTF writeups from The Flat Network Society☆131Updated last week
- PCAP visualization tool☆103Updated last year
- Stash for Binary Exploitation and Reverse Engineering Resources☆100Updated 4 years ago
- DC540 hacking challenge 0x00001.☆26Updated last year
- ☆227Updated last year
- ☆91Updated 2 years ago
- My OSCP notes☆217Updated 6 months ago
- An aggregation of CTF challenges and write-ups for csictf 2020!☆53Updated 2 years ago
- A workshop on Packet Crafting using Scapy.☆152Updated 4 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆26Updated 4 years ago
- A cybersecurity game in Azure Data Explorer☆165Updated 6 months ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated last year
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆122Updated 6 months ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- ☆34Updated 3 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆298Updated 2 months ago