2019 Christmas CTF Platform
☆20May 30, 2022Updated 3 years ago
Alternatives and similar repositories for christmas-ctf-platform
Users that are interested in christmas-ctf-platform are comparing it to the libraries listed below
Sorting:
- An ultra-simple skeleton php application (available as a REST API)☆12Mar 14, 2023Updated 2 years ago
- Source code of SniperOJ running on server right now☆12Oct 23, 2018Updated 7 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.☆69Jan 17, 2023Updated 3 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- 极简风格 OJ 实训平台,自主答题,实时排行榜☆12Apr 12, 2018Updated 7 years ago
- Collection of CTF challenges I made☆53Jan 3, 2025Updated last year
- JavaScript Obfuscation Tool☆18Oct 4, 2019Updated 6 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- ☆32Sep 6, 2021Updated 4 years ago
- My Personal Reading lists for CVE Writeups☆38Feb 10, 2022Updated 4 years ago
- SDPC☆14Oct 6, 2020Updated 5 years ago
- writeup & exploits☆39May 3, 2021Updated 4 years ago
- CTF Write-ups☆16Jul 16, 2018Updated 7 years ago
- Study Assembly Language On Linux☆13Apr 18, 2018Updated 7 years ago
- CanHackMe - Jeopardy CTF Platform☆45Oct 27, 2023Updated 2 years ago
- Stereotyped Challenges (2014~2023)☆84Jan 17, 2023Updated 3 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- ☆26Jun 3, 2016Updated 9 years ago
- ☆24Dec 22, 2020Updated 5 years ago
- repo for ctf☆22Apr 15, 2018Updated 7 years ago
- ☆28Nov 18, 2021Updated 4 years ago
- TDOH Conf 2016 演講相關資料☆30Dec 21, 2016Updated 9 years ago
- ☆11Feb 23, 2019Updated 7 years ago
- Dalam sistem ini meng engkripsi daftar barang dan deskripsi daftar barang dengan mengunakan metode Hill cipher☆15Feb 9, 2023Updated 3 years ago
- BCH bridge for bitwasp/bitcoin☆10Nov 12, 2020Updated 5 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 9 months ago
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 3 years ago
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆162Apr 13, 2019Updated 6 years ago
- 基于 Swoole 构建的 CTF AWD 比赛平台初试水,附带一道题目以及完整 docker☆38Apr 28, 2019Updated 6 years ago
- Smuggler can detect and exploit -HTTP Smuggling- vulnerabilities.☆43Oct 31, 2024Updated last year
- you can use frida in jeb !☆47Sep 25, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- simple teamviewer☆12Jul 9, 2019Updated 6 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Multi-instance IDA Pro MCP server — analyze multiple binaries simultaneously through a single MCP endpoint.☆39Mar 2, 2026Updated last week
- 保留自大三暑假拿到 Mac 以后在 OS X 平台上开发的 Python 代码☆10Aug 7, 2022Updated 3 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago