Zeromutarts Capture the Flag 2013 challenge writeups
☆22Dec 9, 2013Updated 12 years ago
Alternatives and similar repositories for zeromutarts-ctf
Users that are interested in zeromutarts-ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Practical CTF Hacking book, created by and for this class.☆52Apr 16, 2015Updated 10 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆40Oct 24, 2025Updated 5 months ago
- Capture the Flag: Web Edition https://stripe.com/blog/capture-the-flag-20☆279Jul 27, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆15Nov 29, 2022Updated 3 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 9 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- WaybackURLS + OtxURLS + CommonCrawl = The Best Results☆21Dec 7, 2019Updated 6 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated last month
- Collection of CTF Writeups☆12Dec 8, 2022Updated 3 years ago
- Infrastructure setup.☆10Jul 27, 2019Updated 6 years ago
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- Wazuh - Virtual Machines (OVA and AMI)☆18Updated this week
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- ☆19Apr 28, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- evaluation code for SKU110K dataset☆11Dec 28, 2019Updated 6 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Ansible playbook and related roles for setting up a Tor relay.☆11May 25, 2014Updated 11 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- How to (╯°□°)╯︵TABLEFLIP☆12Mar 10, 2016Updated 10 years ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Accompanying code for the paper: LSTMs with Attention for Aggression Detection (TRAC @ COLING 2018)☆14Oct 14, 2018Updated 7 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Walkthrough some CTFs☆51Oct 3, 2020Updated 5 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 3 months ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- Y U WRITE LONG TESTS?☆16Mar 10, 2012Updated 14 years ago