Collection of somewhat useful stuff for CTF events
☆36Jun 24, 2015Updated 10 years ago
Alternatives and similar repositories for ctfcode
Users that are interested in ctfcode are comparing it to the libraries listed below
Sorting:
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- A vector implementation in C.☆10Sep 27, 2016Updated 9 years ago
- C implementation of the mustache templating language☆11Mar 7, 2015Updated 10 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆122Sep 1, 2022Updated 3 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Simple stack language in C. Has a few basic commands; working to implement a `while` loop and user-defined functions. If statement would …☆16Feb 10, 2012Updated 14 years ago
- A URI (and IRI) parser with a straightforward API, based upon uriparser☆28Mar 18, 2018Updated 7 years ago
- Python and golang threading comparison (synchronization primitives). Solutions: Classical IPC problems.☆11Dec 12, 2015Updated 10 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 4 months ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- ☆12Aug 24, 2014Updated 11 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Jan 29, 2015Updated 11 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- Swarm is aiming at your web☆31Jul 5, 2016Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Python toolbox for hacking and problem solving☆22Sep 5, 2016Updated 9 years ago
- Implementation 2-3 heap on C++☆11Dec 16, 2014Updated 11 years ago
- Athc0n 2012 CTF setups☆15Mar 12, 2015Updated 10 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Multiplexing web client supporting HTTP/2 and WHATWG URL compliant parser written in C☆24Mar 31, 2025Updated 11 months ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Jan 30, 2020Updated 6 years ago
- IDA Pro plugin to view Exports☆17Sep 21, 2018Updated 7 years ago
- SECCON2015 online CTF for public☆72Dec 8, 2015Updated 10 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- Totally legitimate☆11May 15, 2019Updated 6 years ago