luker983 / google-ctf-2020View external linksLinks
My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!
☆21Sep 4, 2020Updated 5 years ago
Alternatives and similar repositories for google-ctf-2020
Users that are interested in google-ctf-2020 are comparing it to the libraries listed below
Sorting:
- A collection of my (horribly organized, incomplete and unhelpful) notes for several challenge sites☆11Jun 29, 2016Updated 9 years ago
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- CTF Tools☆12Nov 10, 2019Updated 6 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- The Paper Artifact Availability☆20Aug 26, 2022Updated 3 years ago
- Writeup of CVE-2020-15906☆49Oct 26, 2020Updated 5 years ago
- NSA Codebreaker Challenge 2019 write-ups.☆21Jan 4, 2020Updated 6 years ago
- Add my own POC to test Visual Studio trick to run code when building☆22Jul 18, 2017Updated 8 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- My CTF write-ups☆28Dec 21, 2021Updated 4 years ago
- Flare-On solutions☆37Oct 11, 2019Updated 6 years ago
- ☆30Jul 18, 2025Updated 6 months ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Write-ups for the Buckeye Bureau of BOF☆27May 23, 2022Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 2 years ago
- Writeups of some Reverse Engineering challenges in CTFs I played☆33Aug 26, 2021Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Sep 27, 2021Updated 4 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Updated this week
- ☆42Apr 5, 2025Updated 10 months ago
- ☆38Nov 29, 2022Updated 3 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Script collection for SSH User Login notifications over Pushover.net☆12Jun 6, 2021Updated 4 years ago
- Good code.☆17Nov 18, 2018Updated 7 years ago
- All Write-up pushed by RasyidMF. This repository is created for private or public learning purposes☆10Oct 16, 2020Updated 5 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- Parses Facebook chat messages into Python objects to enable convenient analysis.☆11Jan 3, 2018Updated 8 years ago
- MAGENTO implementation - CARD Processing @mobilPay☆11May 15, 2025Updated 8 months ago
- Fix missing Linux firmware kernel modules!☆17Jan 1, 2024Updated 2 years ago
- Building binutils for pwntools☆84Jan 23, 2026Updated 3 weeks ago
- CTF Writeups☆39Sep 23, 2018Updated 7 years ago
- decode bits into bytes☆46Apr 30, 2020Updated 5 years ago
- ☆45Jan 6, 2026Updated last month