My writeups of various CTFs & security challenges
☆73Oct 15, 2025Updated 4 months ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- ☆13Jan 6, 2020Updated 6 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- ☆11Jun 14, 2022Updated 3 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆10May 1, 2020Updated 5 years ago
- CTF Writeups☆28Aug 15, 2024Updated last year
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Random scripts and files I use for Android reversing☆17Feb 19, 2013Updated 13 years ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 6 years ago
- ☆89Jun 3, 2018Updated 7 years ago
- RingZer0 Writeup.☆29Mar 14, 2019Updated 6 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Unix/Linux System Programming☆17Jan 1, 2015Updated 11 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆18Jan 31, 2024Updated 2 years ago
- Open repository of programming topic for reverse engineering purpose.☆29Jan 20, 2021Updated 5 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- Pentesting notes☆19Jan 31, 2026Updated last month
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57May 1, 2022Updated 3 years ago
- A handfull of writeups☆15Jul 1, 2021Updated 4 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- My solutions to RingZer0 CTF programming challenges☆15Aug 15, 2016Updated 9 years ago
- Open repository of binary sample collections for binary analysis.☆16Apr 20, 2021Updated 4 years ago
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆16Jan 18, 2026Updated last month
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- TCP1P CTF writeup☆32May 23, 2023Updated 2 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- CVE-2020-5837 exploit☆43May 13, 2020Updated 5 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆66Sep 18, 2021Updated 4 years ago