☆10Oct 18, 2024Updated last year
Alternatives and similar repositories for CTF-Writeups
Users that are interested in CTF-Writeups are comparing it to the libraries listed below
Sorting:
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- ☆12Jan 28, 2025Updated last year
- Cross-assemblers, cross-binutils and cross-compilers needed for rebuilding the UPX stubs☆17Jan 8, 2026Updated 2 months ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 5 years ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 2 weeks ago
- All CVE - PoC in GitHub☆13Mar 22, 2024Updated last year
- my knowledge of linux privilege escalation☆11Oct 14, 2023Updated 2 years ago
- the assembly shell and backdoor Trojan☆18Dec 19, 2021Updated 4 years ago
- My CTF tools & some other stuff☆20Aug 12, 2024Updated last year
- ☆13Jul 11, 2024Updated last year
- Clover for xps 13 9343 full driver: sound..... for macos 10.14.6, 10.15.x☆13Oct 5, 2020Updated 5 years ago
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆20Apr 22, 2025Updated 10 months ago
- IRIS Module to Run Any Velociraptor Artifact☆15Mar 31, 2023Updated 2 years ago
- An ESP for Assault Cube 1.2.0.2 that displays information about enemy players above their heads.☆15Nov 16, 2021Updated 4 years ago
- Trainer(aimbot and esp) for Assault Cube on macOS☆22Oct 16, 2019Updated 6 years ago
- won't maintain☆134Mar 4, 2019Updated 7 years ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- Manifest for KekHunterOS overlay ( LOS recommended )☆21Feb 18, 2022Updated 4 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- neural network template draw.io☆16Feb 28, 2018Updated 8 years ago
- Repository for the Udemy Course: "Build an Advanced Keylogger using C++ for Ethical Hacking!" with instructor Ermin Kreponic☆13Feb 1, 2018Updated 8 years ago
- Repository containing the code for training the CroissantLLM☆21Feb 4, 2024Updated 2 years ago
- a tool to bypass negative HTTP status codes on the client side (4xx)☆25Aug 3, 2022Updated 3 years ago
- A docker image running both swift and keystone openstack services for TESTING purposes☆13Feb 28, 2019Updated 7 years ago
- A Python script that decodes USB keyboard packet capture hex data.☆13Nov 17, 2021Updated 4 years ago
- PYMI team CTF write-up☆10Mar 26, 2023Updated 2 years ago
- ☆28Updated this week
- ☆27Aug 15, 2022Updated 3 years ago
- Collection of hacking tools, and ideas you might need to practice ethical hacking.☆30Apr 29, 2022Updated 3 years ago
- Official source code and writeups for niteCTF 2023!☆13Dec 21, 2023Updated 2 years ago
- Tools for passing OSCP☆41Mar 10, 2026Updated last week
- Learning Assembly☆14Jan 8, 2023Updated 3 years ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Jul 18, 2022Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆41Oct 18, 2022Updated 3 years ago
- Quick and dirty scripts for pentesting.☆41Jun 12, 2020Updated 5 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter