CTF write-ups repository
☆42Jul 8, 2023Updated 2 years ago
Alternatives and similar repositories for ctf-write-ups
Users that are interested in ctf-write-ups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 6 months ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- ☆12Feb 1, 2022Updated 4 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆66Jan 31, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- Reversing list☆149Jan 9, 2024Updated 2 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Jul 5, 2020Updated 5 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆27Apr 24, 2019Updated 6 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Repository to save all write-ups from UAM challenges☆29Sep 23, 2020Updated 5 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆12May 2, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- ☆12Sep 10, 2022Updated 3 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆19Jun 17, 2024Updated last year
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Exploiting challenges in Linux and Windows☆121Dec 22, 2019Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆13Aug 22, 2022Updated 3 years ago
- Proof-of-concept for the ZombieLoad and RIDL attacks☆29May 26, 2019Updated 6 years ago
- Small random scripts for various things I find myself needing to repeat/automate☆24Apr 6, 2021Updated 4 years ago
- ☆14Jan 26, 2015Updated 11 years ago
- A search tool that can find exposed email addresses and mobile numbers on Internet.☆16May 12, 2024Updated last year
- SMTP Server Tester, by Alton Johnson (alton.jx@gmail.com)☆19Jul 3, 2015Updated 10 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Open source software radio 3GPP LTE UE☆10Apr 17, 2017Updated 8 years ago
- ☆13Aug 2, 2020Updated 5 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 10 months ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- ☆12Nov 15, 2021Updated 4 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Jan 15, 2020Updated 6 years ago