Materials from different CTFs for later reuse
☆27Mar 23, 2023Updated 2 years ago
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- Public release for b01lers CTF 2021. Thanks for playing!☆10Apr 10, 2021Updated 4 years ago
- ☆16Apr 24, 2023Updated 2 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- ☆17Sep 24, 2022Updated 3 years ago
- ☆29May 4, 2021Updated 4 years ago
- OLD repo for my GitBook (CTF writeups / vuln research / bugbounty) - please check out cryptocat.me/blog for the updated content!☆17Dec 30, 2025Updated 2 months ago
- A Chrome Extension, built to keep you updated with the latest happenings, upcoming contests and, new tech innovations.☆18Dec 15, 2021Updated 4 years ago
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Collection of slides for security presentations I've given in various forums☆14Dec 10, 2023Updated 2 years ago
- Chatting with a single gmail draft via the Gmail API☆13Mar 10, 2020Updated 6 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- my learning case about windows☆21Feb 4, 2022Updated 4 years ago
- Code-base to go with academic paper "REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic" available @ https://pure.qub.a…☆16Aug 10, 2022Updated 3 years ago
- A Go tool to obfuscate and deobfuscate the code and file.☆13May 29, 2022Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆64Apr 8, 2024Updated last year
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- C-based Reverse Shell that uses CMD or PowerShell☆16Aug 15, 2020Updated 5 years ago
- ☆34Jan 4, 2024Updated 2 years ago
- Automated PoC of CVE-2021-44521☆10Feb 24, 2022Updated 4 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- ☆36Jan 22, 2025Updated last year
- ☆23Dec 31, 2025Updated 2 months ago
- My CTF write-ups☆28Dec 21, 2021Updated 4 years ago
- Custom config.☆20May 17, 2023Updated 2 years ago
- NVD semiupdated database to be used with CVEScannerV2☆17Mar 1, 2026Updated 2 weeks ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- A collection of various exploits☆29Sep 17, 2024Updated last year
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- Collection of CS2030 toy programs and PYPs - last updated 31 December 2025☆13Mar 8, 2026Updated last week
- Default project สำหรับงาน data science ที่รวมเอา library หลักๆ ที่ต้องใช้บน Python 3.11 ไว้ให้แล้วใน requirements.txt☆21Feb 6, 2024Updated 2 years ago
- ☆24Apr 18, 2025Updated 11 months ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Sep 25, 2020Updated 5 years ago