NSA Codebreaker Challenge 2019 write-ups.
☆21Jan 4, 2020Updated 6 years ago
Alternatives and similar repositories for nsa-codebreaker-2019
Users that are interested in nsa-codebreaker-2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆64Sep 13, 2021Updated 4 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆16Jan 6, 2017Updated 9 years ago
- FS and ACID patches for both Hekate and Fusée.☆12Sep 17, 2020Updated 5 years ago
- A collection of my (horribly organized, incomplete and unhelpful) notes for several challenge sites☆12Jun 29, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- Ambulance!☆12Nov 13, 2015Updated 10 years ago
- A linux based program that encrypts or decrypts a file☆12Jan 5, 2022Updated 4 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 7 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- NUS library☆24Feb 1, 2022Updated 4 years ago
- Maciej Sypien personal dotfiles for macOS, Linux (ubuntu)☆11Apr 13, 2026Updated 3 weeks ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple reporting plugin for binary ninja☆16Oct 28, 2018Updated 7 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- CherryTree OSCP methodology template☆15Dec 10, 2018Updated 7 years ago
- ☆25Jun 5, 2023Updated 2 years ago
- ☆13May 9, 2021Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PowerShell scripts for dealing with Maintenance Plans.☆12Dec 12, 2018Updated 7 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Jul 18, 2018Updated 7 years ago
- INFILTRATE 2019 Demo Materials☆340Mar 17, 2023Updated 3 years ago
- the challenge generation framework for pwn.college☆23Nov 19, 2025Updated 5 months ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year
- An easy way to give all your EC2 instances SSH host certificates☆16Feb 25, 2023Updated 3 years ago
- Burp Commander written in Go☆55Feb 11, 2019Updated 7 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆20Jun 13, 2019Updated 6 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- My lab reports for some of the security labs developed by Prof. Du of SU.☆10May 16, 2019Updated 6 years ago
- The Shape Context is a shape descriptor that captures the relative positions of other points on the shape contours, and is used to recogn…☆25Apr 16, 2017Updated 9 years ago
- ☆12May 2, 2023Updated 3 years ago
- Anubis Malware Samples☆20Dec 19, 2021Updated 4 years ago