mishrasunny174 / encrypt-ctfView external linksLinks
Git repo for challenges of encryptCTF 2019
☆26Apr 3, 2019Updated 6 years ago
Alternatives and similar repositories for encrypt-ctf
Users that are interested in encrypt-ctf are comparing it to the libraries listed below
Sorting:
- ☆22Oct 24, 2016Updated 9 years ago
- DiceCTF 2021 challenge archive☆22Apr 13, 2021Updated 4 years ago
- Smallest possible PE files. Artisanal, hand-crafted with love and care.☆38Mar 20, 2020Updated 5 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- MVVMUniversal provides a small, portable MVVM foundation (Core.MVVM) and a platform-agnostic library for app concerns and API clients (Co…☆11Sep 15, 2025Updated 5 months ago
- ☆11Sep 26, 2019Updated 6 years ago
- ☆10Jun 2, 2020Updated 5 years ago
- Script to run a trustfull nmap scan againt a target☆11Jun 29, 2025Updated 7 months ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- Execute system calls over the network☆11Nov 17, 2014Updated 11 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- RACF Database Parser☆11Apr 4, 2024Updated last year
- Simple Linux Kernel Module rootkit for 5.x/6.x x86/64 only☆13Apr 21, 2025Updated 9 months ago
- ☆15Jan 24, 2023Updated 3 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Small toolkit designed to enhance reconnaissance and logistical operations in OSCP labs☆14Feb 16, 2024Updated last year
- ☆10Feb 3, 2021Updated 5 years ago
- Ejemplo de timbrado y cancelación de un CFDI consumiendo los servicios web de Facturación Moderna en Python☆16Oct 26, 2017Updated 8 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆15Aug 2, 2017Updated 8 years ago
- Puppet providers and facts for OPNsense.☆11Aug 18, 2021Updated 4 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 3 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- ☆16Oct 31, 2025Updated 3 months ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- This script checks the WOKO website for student accommodation in Zurich for new room entries every 6 to 12 min and sends you an email ale…☆13Apr 24, 2024Updated last year
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Aug 9, 2020Updated 5 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago