writeups for CTFs and other stuff
☆24Dec 29, 2020Updated 5 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- Tools and information about RingZer0CTF.com☆11Jul 21, 2023Updated 2 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- The Skull CTF, A mind-bending hardware puzzle in three acts☆17Apr 1, 2021Updated 4 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21May 20, 2020Updated 5 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆20Jun 13, 2019Updated 6 years ago
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- ☆25Dec 8, 2020Updated 5 years ago
- Blog posts☆29Aug 7, 2020Updated 5 years ago
- ☆28May 9, 2022Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- Interactive tutorial for radare.☆28Sep 14, 2020Updated 5 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- A 3D fluid simulation on the GPU using C++ and Vulkan.☆13Jun 12, 2022Updated 3 years ago
- Some simple process injection techniques targeting the Windows platform☆32Feb 9, 2020Updated 6 years ago
- ☆32Jul 1, 2021Updated 4 years ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- Implementaion of Generic L-layer Neural Network from Scratch☆12May 14, 2018Updated 7 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Lightweight cryptography☆14Nov 7, 2022Updated 3 years ago
- Example of CRUSH compression with optimal parsing using BriefLZ algorithms☆16Nov 1, 2023Updated 2 years ago
- ☆10Apr 30, 2024Updated last year
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- StenographyShellcodeLoader☆43Sep 8, 2020Updated 5 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year