Writeups of CTF challenges I do
☆13Sep 29, 2019Updated 6 years ago
Alternatives and similar repositories for ctf_writeups
Users that are interested in ctf_writeups are comparing it to the libraries listed below
Sorting:
- IDA cLEMENCy Tools☆63Jul 31, 2017Updated 8 years ago
- ☆17Aug 31, 2014Updated 11 years ago
- Real time network visualization for Cyber Defense Competitions.☆14Apr 19, 2015Updated 10 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- Silently extract a YubiKey serial number☆20Aug 20, 2025Updated 6 months ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- This is the python wrapper for The Security Framework SRDF☆49Apr 29, 2014Updated 11 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Nov 12, 2017Updated 8 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Aug 10, 2019Updated 6 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- Ipsumdump and other programs for command-line network trace manipulation.☆40Feb 16, 2024Updated 2 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- Binary Ninja Function Annotator☆40Feb 20, 2019Updated 7 years ago
- ☆85Apr 10, 2023Updated 2 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆94Oct 19, 2020Updated 5 years ago
- Course Projects for Stanford CS142 Web Applications☆10Oct 15, 2016Updated 9 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- ☆16May 13, 2021Updated 4 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- Alcatel-Lucent SR/OS (TiMOS) Firmware Packer☆11May 31, 2017Updated 8 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- Vector Tree Ring Generator for Pen Plotting☆12Oct 16, 2023Updated 2 years ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago
- Scripts for Binary Ninja☆258Apr 11, 2023Updated 2 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- ☆11Apr 16, 2019Updated 6 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Source code of https://torstatus.rueckgr.at☆10Jan 14, 2026Updated last month