legitbs / quals-2015View external linksLinks
☆24Dec 6, 2015Updated 10 years ago
Alternatives and similar repositories for quals-2015
Users that are interested in quals-2015 are comparing it to the libraries listed below
Sorting:
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated 3 weeks ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Linux assembly programs☆17Updated this week
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- TRS-80 Star Trek 2014 !!☆17Nov 20, 2025Updated 2 months ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- ☆14Apr 28, 2016Updated 9 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- collateral from http://basicinputoutput.com☆15Feb 15, 2023Updated 3 years ago
- ☆38Oct 23, 2015Updated 10 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆29Jul 1, 2013Updated 12 years ago
- A tool for dumping wtmp files and patching wtmp records☆20Jul 20, 2019Updated 6 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Jan 24, 2017Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago