Security Capture The Flag (CTF) competition writeups and learning notes.
☆14Feb 14, 2017Updated 9 years ago
Alternatives and similar repositories for security_ctf
Users that are interested in security_ctf are comparing it to the libraries listed below
Sorting:
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- A C2 Framework developed as an FYP☆12Feb 15, 2026Updated 2 weeks ago
- All the lab manuals, tasks and their solutions for the course CY243 - Penetration Testing along with a Teacher's manual for Lab Setup wil…☆16Feb 5, 2024Updated 2 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- archive of the released challenges from corCTF 2021☆25Sep 20, 2021Updated 4 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- CTFd plugin allowing for individual Docker containers per team☆26Jun 27, 2022Updated 3 years ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- Vulnerability Reports by Aleph Research☆36Mar 10, 2024Updated last year
- ☆43Dec 28, 2023Updated 2 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Android lockscreen password cracker via ADB (Tested only on Asus Zenfone 4 A450CG )☆10Jul 3, 2017Updated 8 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- This script checks visa application status using idata.com.tr services in Turkey (for Germany and Italy) and notifies OSX Notification Ce…☆11Jul 9, 2015Updated 10 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- ☆36Sep 5, 2017Updated 8 years ago
- Hackme is a network security answer platform,Hackme网络安全答题平台☆10Nov 5, 2015Updated 10 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Unpacks java-to-exe files converted by JWrapper☆12Dec 5, 2022Updated 3 years ago
- Intrusion Detection System (IDS) for Wireless Sensor Networks (WSN)☆18Apr 5, 2013Updated 12 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Bytekit is a PHP extension that provides a userspace representation of the opcodes generated by the Zend engine compiler built into PHP.☆19May 21, 2011Updated 14 years ago