☆24Dec 6, 2015Updated 10 years ago
Alternatives and similar repositories for quals-2015
Users that are interested in quals-2015 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Tools and library to manipulate EFI variables.☆10Mar 17, 2026Updated last week
- ☆15Apr 9, 2018Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- ☆10Feb 16, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Jan 26, 2016Updated 10 years ago
- Ruby library for communicating with UCI (Universal Chess Interface) engines.☆19Dec 16, 2014Updated 11 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- ☆11May 7, 2019Updated 6 years ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Linux assembly programs☆18Updated this week
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A very boring programming language☆12Aug 19, 2025Updated 7 months ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- CGMiner 3.72 with GridSeed GC3355 support☆30May 8, 2014Updated 11 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- code and manual for the defcon shoot 23 badge☆10Aug 10, 2015Updated 10 years ago
- ☆26Dec 8, 2025Updated 3 months ago
- ☆19Jan 5, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Runes of Magic database☆10Aug 23, 2022Updated 3 years ago
- Recent Fuzzing Paper☆16Jan 5, 2023Updated 3 years ago