A repository of challenges from various CTF competitions.
☆157Apr 13, 2014Updated 11 years ago
Alternatives and similar repositories for CTF-Challenges
Users that are interested in CTF-Challenges are comparing it to the libraries listed below
Sorting:
- Solutions to a variety of Capture The Flag challenges from different competitions.☆215May 13, 2019Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆14Aug 6, 2013Updated 12 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- ☆138Sep 27, 2021Updated 4 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- hax 'n shit☆121Jun 3, 2015Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Zeromutarts Capture the Flag 2013 challenge writeups☆22Dec 9, 2013Updated 12 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Network Keylogger is an open source program that sends every key pressed in a computer to another computer, via TCP/IP. It can be used to…☆41Apr 25, 2011Updated 14 years ago
- Collection of my IDAPython scripts☆33Sep 17, 2015Updated 10 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago