Short writeups/solvers for interesting CTF challenges.
☆16Nov 12, 2022Updated 3 years ago
Alternatives and similar repositories for Short-CTF-Writeups
Users that are interested in Short-CTF-Writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- ☆28Jun 24, 2023Updated 2 years ago
- ☆103Jan 3, 2022Updated 4 years ago
- ☆12Mar 7, 2020Updated 6 years ago
- Parses Lua 5.1 bytecode☆13May 27, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆13Oct 10, 2018Updated 7 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- some hackz for gather.town☆16Feb 19, 2022Updated 4 years ago
- Symbolic execution in radare2 with angr☆39Jul 27, 2021Updated 4 years ago
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- ☆27May 25, 2022Updated 3 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆19Feb 9, 2025Updated last year
- RSA Encryption and Decryption project☆10Apr 23, 2018Updated 7 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- ☆26Apr 23, 2021Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- A Golomb encoding/decoding implementation in C☆13Aug 6, 2011Updated 14 years ago
- Writeups of some Reverse Engineering challenges in CTFs I played☆33Aug 26, 2021Updated 4 years ago
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆12Aug 4, 2022Updated 3 years ago
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Trace function calls using lldb☆13Jul 5, 2021Updated 4 years ago
- HITB SECCONF EDU CTF 2021. Developed with ❤️ by Hackerdom team and HITB.☆19Aug 28, 2021Updated 4 years ago
- ☆34Jan 4, 2024Updated 2 years ago
- Simulator/interpreter for Arm64 machine language☆14Jun 17, 2022Updated 3 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆43Apr 11, 2025Updated 11 months ago
- ☆45Jan 6, 2026Updated 2 months ago
- Our CTF Write-Up / solve scripts☆22Aug 21, 2023Updated 2 years ago
- ☆12Aug 5, 2023Updated 2 years ago
- docker env for ios research on a mac host☆28Jun 12, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.