luker983 / nsa-codebreaker-2020Links
My solutions to the 2020 NSA Codebreaker Challenge
☆75Updated 4 years ago
Alternatives and similar repositories for nsa-codebreaker-2020
Users that are interested in nsa-codebreaker-2020 are comparing it to the libraries listed below
Sorting:
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 5 years ago
- Using Spotify Playlists as Malware CDN☆27Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 7 months ago
- A collection of techniques commonly used in malware to accomplish core tasks.☆84Updated 6 years ago
- Shared reverse shell over Discord☆131Updated 4 years ago
- Winsock accept() Backdoor Implant.☆115Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 5 years ago
- ☆64Updated 11 months ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- CTF scripts and writeups (mostly challenge + .py solving script)☆23Updated last week
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- x64 Windows Exploit Development☆111Updated 10 months ago
- ☆51Updated 2 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- SSD Challenges☆47Updated 2 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆32Updated 4 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- ☆26Updated 6 years ago
- Cryptovenom: The Cryptography Swiss Army Knife☆1Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- ☆182Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆44Updated 3 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆58Updated 5 years ago