nongiach / ctf_challsView external linksLinks
All challenges I created for CTF
☆12Jun 7, 2021Updated 4 years ago
Alternatives and similar repositories for ctf_challs
Users that are interested in ctf_challs are comparing it to the libraries listed below
Sorting:
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- ☆26May 7, 2018Updated 7 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- Example project demonstrating some kind of OpenSSL certificate pinning. Related to blogpost at TKTK showing how to bypass such pinning.☆19Jan 2, 2015Updated 11 years ago
- ☆19Jul 9, 2019Updated 6 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- Disables ASLR flag IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE in IMAGE_OPTIONAL_HEADER on pre-compiled EXE. Works for both 32 and 64 bit Windo…☆20Jan 13, 2021Updated 5 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Apr 23, 2018Updated 7 years ago
- dontpopme bitches☆24Jun 16, 2022Updated 3 years ago
- ☆27Nov 26, 2024Updated last year
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago
- ☆23Jan 22, 2017Updated 9 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- An automated setup for fuzzing Redis w/ AFL++☆35Mar 12, 2022Updated 3 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- Parses the WMI object database....looking for persistence☆34Dec 12, 2019Updated 6 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Aug 27, 2019Updated 6 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- PDML importer for Burp Suite☆28Oct 20, 2020Updated 5 years ago
- ☆35Jan 27, 2025Updated last year
- ☆35Oct 29, 2021Updated 4 years ago
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- ☆31Feb 10, 2020Updated 6 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 8 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 5 years ago
- ☆39Dec 10, 2024Updated last year
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆47Jan 28, 2023Updated 3 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Dec 17, 2024Updated last year