malware-unicorn / BeatSaberCTFChallengeLinks
Created a CTF challenge based on Beat Saber
☆40Updated 5 years ago
Alternatives and similar repositories for BeatSaberCTFChallenge
Users that are interested in BeatSaberCTFChallenge are comparing it to the libraries listed below
Sorting:
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- ☆17Updated 5 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆73Updated 5 years ago
- Scoring Engine for CTF competitions☆47Updated 2 years ago
- ☆76Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Scapy hands-on at #GreHack17☆16Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- POLAR☆73Updated 6 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- Red Team Resources☆60Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Updated 6 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆29Updated 5 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 4 years ago
- Basic tutorials for reverse engineer with radare2☆60Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 4 years ago
- A collection of infosec related scripts and information.☆53Updated 8 months ago
- ☆99Updated 6 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆81Updated 9 months ago
- ☆122Updated 7 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Simple DDE object detector☆56Updated 7 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆18Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Binary exploitation CTF challenge☆24Updated 6 years ago