☆11Feb 23, 2025Updated last year
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- Public WCSC writeups☆19Sep 18, 2017Updated 8 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆29Nov 20, 2021Updated 4 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- Example implementations of PEP 578 and 551 entry points☆35May 12, 2025Updated 9 months ago
- ☆32Jul 14, 2025Updated 7 months ago
- This is check50, a command-line program with which you can check the correctness of your programs.☆12Nov 13, 2021Updated 4 years ago
- A python script to add Songs from Spotify Playlists to YouTube Playlists.☆10Mar 1, 2023Updated 3 years ago
- Scapy hands-on☆36Nov 16, 2023Updated 2 years ago
- Source code, descriptions and writeups of INS'hAck 2019 CTF challenges!☆33May 11, 2019Updated 6 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- All my solutions to Clash of Code (Codingame.com)☆11Jun 10, 2021Updated 4 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- ☆10Oct 18, 2024Updated last year
- ☆12Aug 1, 2025Updated 7 months ago
- All Write-up pushed by RasyidMF. This repository is created for private or public learning purposes☆10Oct 16, 2020Updated 5 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Latihan membuat aplikasi rest api☆11Dec 22, 2022Updated 3 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last week
- drchrono API example using django☆11Feb 11, 2025Updated last year
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Scan systems and docker images for potential spring4shell vulnerabilities. Will detect in-depth (layered archives jar/zip/tar/war and sca…☆11Apr 2, 2022Updated 3 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- Lightweight, low-dependency wrapper for basic WMI functionality on Windows.☆14Jan 27, 2026Updated last month
- tfcrypt -- high security Threefish encryption tool.☆10Aug 9, 2023Updated 2 years ago
- A curated list of Rust code and resources. With repository stars⭐ and forks🍴☆14Updated this week