demo of an attack & defense CTF
☆16Jun 4, 2018Updated 7 years ago
Alternatives and similar repositories for attack-defense-CTF-demo
Users that are interested in attack-defense-CTF-demo are comparing it to the libraries listed below
Sorting:
- CTF writeups☆42Updated this week
- write up for pwnable.kr☆24Nov 1, 2017Updated 8 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- Material do Grupo de Estudos em Ciência de Dados☆13Jan 25, 2021Updated 5 years ago
- Moviemate 🎥 is an electron based desktop app that will change your movie night experience by indexing and syncing all your movies and sh…☆10Dec 14, 2016Updated 9 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- Repositório da Disciplina de Geoprocessamento - UFRPE☆13Mar 2, 2020Updated 6 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- Python Library for Function Approximation in Machine Learning☆12Nov 5, 2019Updated 6 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Active Directory Tiered Administration Model☆18Aug 2, 2025Updated 7 months ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Please, see README.md for further information.☆12May 16, 2025Updated 9 months ago
- Template for living data workflow☆13Jan 30, 2019Updated 7 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 8 years ago
- repo do Diego☆10Nov 7, 2023Updated 2 years ago
- NVIDIA Compute Unified Device Architecture Toolkit☆15Feb 2, 2026Updated last month
- My configurations (dotfiles) and Fedora Workstation setup with ansible☆10Aug 16, 2021Updated 4 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Collection of generative art made by me.☆10Jul 8, 2018Updated 7 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Postador Automático de Imagens no Facebook.☆10Feb 13, 2021Updated 5 years ago
- ☆12Jun 12, 2019Updated 6 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 5 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- DGX RHEL SELinux Policies☆16Apr 12, 2024Updated last year
- a tiny quirky library with some bezier curve functions☆17Mar 6, 2025Updated 11 months ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Scripts for building Vagrant boxes for VMware Fusion that boot macOS☆14Feb 1, 2019Updated 7 years ago
- CLI utility to practice typing strong passphrases, in Python and Go.☆13Jan 1, 2018Updated 8 years ago
- Generate livecoding drum patterns with magenta.js☆13Dec 9, 2022Updated 3 years ago
- De vez em quando eu volto para meus estudos de NLP e dados. Aqui está o andamento do estudo ;)☆13Dec 27, 2017Updated 8 years ago
- Stub for polymorphic code☆11Mar 18, 2023Updated 2 years ago
- A module that multiplexes interactions with lists of python objects.☆14Aug 24, 2022Updated 3 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- ☆16Aug 18, 2016Updated 9 years ago
- Simple OWASP-ZAP API that makes spider and scanner in your web application.☆12Feb 27, 2024Updated 2 years ago
- ☆15Apr 13, 2021Updated 4 years ago