nullpsifer / cryptosploitLinks
☆19Updated 2 months ago
Alternatives and similar repositories for cryptosploit
Users that are interested in cryptosploit are comparing it to the libraries listed below
Sorting:
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆918Updated 9 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆581Updated 3 weeks ago
- knowledge is power☆229Updated 2 months ago
- CTF writeups from The Flat Network Society☆149Updated 3 months ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆197Updated last month
- Repository to deploy CTFd using docker.☆41Updated 4 years ago
- ☆1,398Updated 4 years ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆335Updated 3 years ago
- Vulnerable server used for learning software exploitation☆1,081Updated 5 years ago
- Writeups of previous editions☆72Updated last year
- Docker image for attacking cryptography CTF challenges☆109Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆320Updated 2 years ago
- RSHack - Tool for RSA CTF's challenges☆98Updated 6 years ago
- OSWE Preparation☆638Updated 3 years ago
- Challenges used in CUCTF 2019☆25Updated 6 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- Example pwnable challenge hosted with docker☆227Updated last year
- Damn Vulnerable IoT Device☆212Updated last year
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube…☆180Updated 6 years ago
- A CTF platform used in IceCTF 2016☆69Updated 5 years ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆579Updated last year
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆85Updated 2 years ago
- The purpose of this repository is to archive any extraneous documents, or anything else that really has no specific category but needs a …☆84Updated 6 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆106Updated 5 years ago
- This repo is meant to be a list of companies that hire security people full remote.☆456Updated 4 months ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆111Updated 4 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- esoteric☆54Updated 5 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆706Updated last year