montrehack / challengesLinks
Source code from some of the challenges that were presented at http://montrehack.ca
☆35Updated 8 months ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- The challenge writeups and solutions for yookiterm-challenge-files☆38Updated 2 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- Here are the challenges (including sources) of the GreHack CTF.☆106Updated last year
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- ☆21Updated last year
- Code Review Audit Script Scanner☆141Updated last week
- A repository of previous info-sec presentations I've presented.☆162Updated 11 months ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- A cheat sheet for attacking SQLite via SQLi☆101Updated 9 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated 2 weeks ago
- Setup for a pwning VM☆62Updated 6 years ago
- ☆13Updated 6 years ago
- ☆100Updated 3 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- Scripts I used during CTP☆67Updated 5 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆52Updated 9 years ago
- A Platform for Testing Secure Coding/Config☆19Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- ☆52Updated 6 years ago
- A repository for GraphQL Extension for Burp Suite☆57Updated 6 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- ☆20Updated 8 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- Damn Vulnerable Thick Client App☆151Updated 5 years ago