In service of posteriority
☆45Feb 1, 2026Updated 2 months ago
Alternatives and similar repositories for archiveooo
Users that are interested in archiveooo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of information security companies that offer penetration testing services and/or other offensive red side orientated services at a…☆18Apr 18, 2023Updated 2 years ago
- ☆11Jun 20, 2021Updated 4 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- ☆50Feb 23, 2022Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆14Dec 14, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Slack bot for challenge management in large teams☆60Dec 8, 2022Updated 3 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- CTF Challenge☆19Nov 20, 2020Updated 5 years ago
- LD_PRELOAD, but for Python.☆19Jun 29, 2019Updated 6 years ago
- CTFd scoreboard for a single category☆12Aug 23, 2019Updated 6 years ago
- Collection of reusable references☆14Jan 1, 2026Updated 3 months ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Writeups of CTF challenges☆32Sep 30, 2020Updated 5 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- Automatically detected Relay Groups on the Tor Network☆14Aug 14, 2023Updated 2 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Linux Device Drivers 3 examples updated to work in recent kernels☆25May 6, 2012Updated 13 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 6 months ago
- ☆11Dec 10, 2017Updated 8 years ago
- archive of the released challenges from corCTF 2021☆25Sep 20, 2021Updated 4 years ago
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Aug 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Open source release of challenges and other code used in the Hack-A-Sat Qualifier in 2020.☆91Jun 22, 2024Updated last year
- ☆19Dec 28, 2021Updated 4 years ago
- Automatic Binary Parallelisation☆43Feb 28, 2025Updated last year
- Python Digital Forensics [video], published by Packt☆21Jan 30, 2023Updated 3 years ago
- Format string exploitation helper☆46Nov 16, 2015Updated 10 years ago
- ROP database plugin for IDA☆32Jun 5, 2018Updated 7 years ago
- Demo showing how to build a good software supply chain from operations -> Middleware -> Develoeprs/Application Owners☆16Oct 28, 2020Updated 5 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- Useful cyber security and digital forensics resources☆17Oct 20, 2020Updated 5 years ago
- ☆18Jun 14, 2018Updated 7 years ago
- RealWorld CTF 3rd billboard challenge & writeup☆27Jan 6, 2023Updated 3 years ago
- ☆30Dec 26, 2021Updated 4 years ago
- This article documents the thought process and steps involved in refactoring a distributed monolith to microservices. We are going to rem…☆15Jul 30, 2020Updated 5 years ago
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago