Things we learned from Capture The Flag hacking competitions we participated in
☆22Mar 15, 2021Updated 5 years ago
Alternatives and similar repositories for CTF-writeups
Users that are interested in CTF-writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python Tools☆14Oct 1, 2020Updated 5 years ago
- Repository for writeups of ctf challenges☆11Jan 28, 2024Updated 2 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- My write-ups from various CTFs☆119Jan 18, 2024Updated 2 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Nov 4, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆11May 12, 2022Updated 3 years ago
- ☆18Oct 15, 2025Updated 5 months ago
- A simple script to decode the genome DNA binary sequence (CTF Challenge)☆24Aug 21, 2020Updated 5 years ago
- ☆25Aug 19, 2024Updated last year
- Code for Threading + Queue videos☆25Dec 12, 2017Updated 8 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Mirror of https://codeberg.org/krisbalintona/emacs-config☆11Updated this week
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆21Jun 8, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Write-ups to CTF challenges☆30Apr 9, 2021Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Linkfinder by Rdzsp is a browser extension that automatically scans and collects endpoints from JavaScript files on websites☆33Aug 22, 2024Updated last year
- ☆11Dec 30, 2020Updated 5 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 8 years ago
- A CLI tool to deploy CTF challenges to a k8 cluster for csictf.☆13Jan 7, 2023Updated 3 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Personal deploy of github streak stats forked from denvercoder's streak stats☆20Mar 24, 2026Updated 2 weeks ago
- ☆24Apr 18, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and…☆167Jan 9, 2024Updated 2 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- The first step to automate things; from a Markdown to a CLI☆13Jan 13, 2026Updated 2 months ago
- Configs, scripts and themes for my $HOME.☆11Mar 20, 2026Updated 3 weeks ago
- My custom Arch Linux PKGBUILD of the Emacs development target☆10Mar 4, 2025Updated last year
- ☆17Oct 28, 2025Updated 5 months ago
- CTF writeups☆12Aug 10, 2020Updated 5 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 3 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆16Jun 5, 2021Updated 4 years ago
- Helps you saving your mail attachments (e.g. epub-files, PDFs) to a temporary directory, convert the files to MOBI-format and send them d…☆14Feb 24, 2019Updated 7 years ago
- ☆18May 18, 2025Updated 10 months ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago