Challenges and writeups for the US Cyber Open for 2024
☆21Jun 11, 2024Updated last year
Alternatives and similar repositories for SIV-US-Cyber-Open
Users that are interested in SIV-US-Cyber-Open are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Jun 13, 2023Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆20Dec 3, 2024Updated last year
- General purpose attack-defense range for zero-config deployment☆44Nov 20, 2025Updated 3 months ago
- Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.☆11Apr 19, 2024Updated last year
- ☆27Oct 15, 2025Updated 4 months ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Jul 18, 2022Updated 3 years ago
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- ☆57Jan 30, 2026Updated last month
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- The next iteration of Tovy☆10Feb 14, 2026Updated 3 weeks ago
- 👶🏻😿 A zero-dependency network sniffer, written from scratch, that supports emulated and native cBPF. Runs on Linux, BSD, macOS and Win…☆13Nov 8, 2025Updated 4 months ago
- ☆10Oct 25, 2021Updated 4 years ago
- A 64 bit OS☆10Nov 12, 2025Updated 3 months ago
- Runs exploits, fast.☆113Oct 11, 2025Updated 4 months ago
- Free access to GPT-4, using only a Github Copilot subscription.☆45Feb 13, 2024Updated 2 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- programmatic binary patching using ptrace☆13Aug 9, 2025Updated 7 months ago
- ☆12Dec 16, 2022Updated 3 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Epub source for the Standard Ebooks edition of Short Fiction, by Anton Chekhov. Translated by Constance Garnett☆12Feb 4, 2026Updated last month
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- defcon 30 30-in-One badge☆10Sep 11, 2022Updated 3 years ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Hex Editor Neo Structure Definition File Library☆11Jul 4, 2025Updated 8 months ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Apr 28, 2024Updated last year
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 2 months ago
- Oink Bootloader (OinkBL),系列文[世界第一簡單的UEFI,實作打造自己的開機畫面](https://ithelp.ithome.com.tw/users/20161828/ironman/6446?page=1)☆11Nov 18, 2023Updated 2 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- CTF writeups for the CTFs and Vulnerable Boxes I play with sometimes☆11Apr 20, 2017Updated 8 years ago