Security Capture The Flag (CTF) competition writeups and learning notes.
☆15Feb 14, 2017Updated 9 years ago
Alternatives and similar repositories for security_ctf
Users that are interested in security_ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- A C2 Framework developed as an FYP☆12Feb 15, 2026Updated last month
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- ☆30Dec 11, 2025Updated 3 months ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 6, 2026Updated 2 weeks ago
- 🔍Lookup and Analyze Packet Capture ('PCAP') Files☆13Mar 17, 2019Updated 7 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- Documentation generator for C/C++ code☆56Oct 15, 2025Updated 5 months ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- PowerShellUtilities provides various utility commandlets.☆51Aug 3, 2020Updated 5 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- In this episode Ben uses the Raspberry Pi Zero to create the smallest Pi portable computer that he has ever made!☆14Jul 4, 2016Updated 9 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- My attempt at writing an Operating System from scratch☆13Mar 3, 2023Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Precompiled binaries for windows & Linux☆33Jun 11, 2025Updated 9 months ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 9 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆36Feb 13, 2024Updated 2 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- ☆11Mar 9, 2018Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- ☆13Apr 1, 2021Updated 4 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago