mitre-cyber-academy / 2022-ectf-insecure-exampleView external linksLinks
Insecure reference example for the 2022 Collegiate eCTF
☆13Apr 6, 2022Updated 3 years ago
Alternatives and similar repositories for 2022-ectf-insecure-example
Users that are interested in 2022-ectf-insecure-example are comparing it to the libraries listed below
Sorting:
- Insecure reference example for the 2023 Collegiate eCTF☆18Feb 28, 2023Updated 2 years ago
- Support tools for the MITRE 2023 eCTF☆15Mar 9, 2023Updated 2 years ago
- Angular Frontend for the Spring Boot Microservices series☆13Jun 9, 2024Updated last year
- A python script to add Songs from Spotify Playlists to YouTube Playlists.☆10Mar 1, 2023Updated 2 years ago
- This is check50, a command-line program with which you can check the correctness of your programs.☆12Nov 13, 2021Updated 4 years ago
- This is an implementation of SafeBricks, based on NetBricks maintained by Comcast and refined by Yang: https://github.com/YangZhou1997/Ne…☆10Feb 3, 2020Updated 6 years ago
- ☆13Updated this week
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Is using KoP (Kafka-On-Pulsar) a good idea? Use the scenarios implemented in this repository to check whether Pulsar with KoP enabled is …☆12Nov 3, 2022Updated 3 years ago
- All my solutions to Clash of Code (Codingame.com)☆11Jun 10, 2021Updated 4 years ago
- MOM (My Own Messages) Client - A voice for you and your smart contracts☆10Jan 7, 2023Updated 3 years ago
- A benchmark for generic, large-scale shuffle operations on continuous stream of data, implemented with state-of-the-art stream processing…☆14Updated this week
- Repo for transient training paper at ICAC 2019.☆11Oct 5, 2022Updated 3 years ago
- This GitHub repository contains a project that automates the provisioning of a Kubernetes (K8s) cluster using Infrastructure as Code (IaC…☆15Oct 19, 2025Updated 3 months ago
- Broadcast Kafka messages using web sockets, ZIO playground☆10Nov 13, 2023Updated 2 years ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- ☆10Sep 12, 2022Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A Secure Version of DATAVIEW using SGX techniques.☆10Jul 6, 2021Updated 4 years ago
- Homework Template for Typst☆12Apr 5, 2023Updated 2 years ago
- drchrono API example using django☆11Feb 11, 2025Updated last year
- A Reservation Management App using Firebase Back-end with Flutter for Cross Platform Development.☆13Sep 5, 2022Updated 3 years ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- s390/s390x ABI specification☆14Sep 17, 2025Updated 4 months ago
- some useful configs☆10Oct 7, 2025Updated 4 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- ☆10Mar 9, 2023Updated 2 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- The Swiss Court Ruling Corpus (SCRC) contains code for extracting information from Swiss court rulings☆11Jan 22, 2025Updated last year
- Network- and GPU-aware management of serverless functions at the edge☆15Mar 3, 2023Updated 2 years ago
- Learn Kyo with simple exercises!☆13Aug 25, 2025Updated 5 months ago
- ☆10Jun 5, 2021Updated 4 years ago
- ☆13Aug 22, 2023Updated 2 years ago
- ☆12Sep 12, 2025Updated 5 months ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Apr 28, 2024Updated last year
- ☆11Dec 8, 2023Updated 2 years ago