luker983 / nsa-codebreaker-2019Links
NSA Codebreaker Challenge 2019 write-ups.
☆21Updated 5 years ago
Alternatives and similar repositories for nsa-codebreaker-2019
Users that are interested in nsa-codebreaker-2019 are comparing it to the libraries listed below
Sorting:
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- ☆17Updated 5 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆73Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 4 years ago
- ☆13Updated 6 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 8 months ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- Plaintext Password harvesting from Azure Windows VMs☆67Updated 7 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Simple DDE object detector☆56Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆14Updated 7 years ago
- Basic tutorials for reverse engineer with radare2☆61Updated 6 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Use Markov Chains to obfuscate data as other data☆53Updated 8 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated last year
- DNS server limitation mapper☆26Updated 6 years ago
- Drupal Honeypot☆57Updated 5 years ago