luker983 / nsa-codebreaker-2019Links
NSA Codebreaker Challenge 2019 write-ups.
☆21Updated 5 years ago
Alternatives and similar repositories for nsa-codebreaker-2019
Users that are interested in nsa-codebreaker-2019 are comparing it to the libraries listed below
Sorting:
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 6 years ago
- ☆122Updated 7 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆35Updated 6 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆74Updated 5 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Repo for the Gitbook Practical Hacking☆103Updated 6 years ago
- CLI tool to get the links of original writeups from ctftime.org☆32Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- I'll post my custom shellcode I make here!☆22Updated 5 years ago
- ☆182Updated 5 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Python script to scan Git repos for interesting strings☆159Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆117Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- No-Script Automation Tool☆56Updated 7 years ago