☆26Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for ctf-solutions
Users that are interested in ctf-solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Decompress Xamarin .NET compressed binaries so they can be decompiled.☆48Oct 7, 2020Updated 5 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- FactorDB client library with Python☆53Apr 10, 2023Updated 3 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- CANoolder: CAN to 3.3V logic level interface. Dumb. Cheap. Simple. Pick 3.☆15Feb 14, 2018Updated 8 years ago
- Small python module for common CTF crypto functions☆168Aug 28, 2022Updated 3 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Extract .NET assemblies from Xamarin mobile applications.☆51Aug 9, 2021Updated 4 years ago
- Comment rebasing for IDA Pro☆27Apr 6, 2020Updated 6 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- An nRF52832 based, low power wire / contactless badge with Bluetooth Low Energy 5.0 and NFC functionality.☆10Oct 11, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 8 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 5 months ago
- Examples of Static and Dynamic Thread Local Storage Callback Creation☆24Apr 6, 2017Updated 9 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 4 months ago
- An in progress learning kernel for x86.☆14Sep 18, 2017Updated 8 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Generate strong passwords using /dev/urandom 👻☆15Aug 7, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- OptionsBleed (CVE-2017-9798) PoC / Scanner☆18May 21, 2024Updated last year
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- Dev board for RP2040 and FUSB302B☆12Dec 20, 2023Updated 2 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- ☆17May 22, 2021Updated 4 years ago
- Materials from the CS Level-Up trainers☆11Aug 10, 2025Updated 8 months ago
- Python code and data for the post "Word Segmentation, or Makingsenseofthis"☆17Oct 24, 2022Updated 3 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Jan 8, 2017Updated 9 years ago
- Repository containing several CTF write-ups while playing for the ácaros team☆11May 24, 2020Updated 5 years ago
- The Amazing $1 Microcontrollers☆15May 14, 2019Updated 6 years ago
- Dragon Sandbox☆82Apr 1, 2013Updated 13 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- ☆11Jun 5, 2020Updated 5 years ago