Short writeups/solvers for interesting CTF challenges.
☆16Nov 12, 2022Updated 3 years ago
Alternatives and similar repositories for Short-CTF-Writeups
Users that are interested in Short-CTF-Writeups are comparing it to the libraries listed below
Sorting:
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- ☆26Apr 23, 2021Updated 4 years ago
- A simple tool to hide window by process name☆21Oct 11, 2017Updated 8 years ago
- ☆104Jan 3, 2022Updated 4 years ago
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- ☆29Jun 24, 2023Updated 2 years ago
- Some crypto scripts which is useful in study and ctf☆29Sep 2, 2021Updated 4 years ago
- ☆27May 25, 2022Updated 3 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Oct 18, 2023Updated 2 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Apr 11, 2025Updated 10 months ago
- Writeups of some Reverse Engineering challenges in CTFs I played☆33Aug 26, 2021Updated 4 years ago
- An easy-to-install ChatGPT clone you can host on your own web server and access from a web browser.☆10May 26, 2023Updated 2 years ago
- ☆39Dec 10, 2024Updated last year
- A Sublime Text 2 Plugin that can generate a sequence of numbers using search and replace.☆28Sep 29, 2019Updated 6 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Good code.☆17Nov 18, 2018Updated 7 years ago
- ☆44Aug 8, 2022Updated 3 years ago
- Research papers on ML for security☆35Jul 23, 2020Updated 5 years ago
- Symbolic execution in radare2 with angr☆39Jul 27, 2021Updated 4 years ago
- ☆45Jan 6, 2026Updated last month
- extract various firmware blobs from iBoot☆48Oct 4, 2020Updated 5 years ago
- DarksVM is a modified version of KoiVM, a complex ConfuserEx plugin that made it possible to virtualize methods and other data, increasin…☆37Sep 14, 2019Updated 6 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- A utility to parse mpeg dash mpd files quickly☆20Jun 21, 2025Updated 8 months ago
- ☆11Oct 22, 2010Updated 15 years ago
- Reverse Engineering the Tabstate files for Windows Notepad☆10May 1, 2024Updated last year
- Python script for downloading wetransfer files (https://www.wetransfer.com/) in command line mode☆10Apr 7, 2021Updated 4 years ago
- Tools, scripts, demos, and other goodies for the Reko decompiler☆17Oct 2, 2025Updated 5 months ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- Binary Ninja Plugin for RISC-V☆14Nov 29, 2023Updated 2 years ago
- ☆10Jan 13, 2026Updated last month
- Conan extension☆10Sep 20, 2025Updated 5 months ago
- Blocks unsigned internet binaries from executing (El Capitan)☆10Feb 1, 2021Updated 5 years ago
- HexDumpColoringBook - binary file analysis helper☆13Jun 21, 2019Updated 6 years ago
- ☆10Aug 16, 2021Updated 4 years ago