☆26Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for ctf-solutions
Users that are interested in ctf-solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF (Capture The Flag) writeups, code snippets, notes, scripts☆14Dec 28, 2019Updated 6 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- ☆13Oct 27, 2022Updated 3 years ago
- VoidHack CTF write-ups☆60Mar 9, 2019Updated 7 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Provide easy conversion between crypto symbol and name, auto update daily☆16Nov 15, 2024Updated last year
- FactorDB client library with Python☆54Apr 10, 2023Updated 2 years ago
- ☆23Jul 16, 2022Updated 3 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆25Dec 19, 2023Updated 2 years ago
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- A Frida script to bypass Xamarin certificate pinning implementations☆75Jan 6, 2023Updated 3 years ago
- CANoolder: CAN to 3.3V logic level interface. Dumb. Cheap. Simple. Pick 3.☆15Feb 14, 2018Updated 8 years ago
- Small python module for common CTF crypto functions☆168Aug 28, 2022Updated 3 years ago
- Extract .NET assemblies from Xamarin mobile applications.☆51Aug 9, 2021Updated 4 years ago
- Comment rebasing for IDA Pro☆27Apr 6, 2020Updated 5 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 8 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 5 months ago
- Examples of Static and Dynamic Thread Local Storage Callback Creation☆24Apr 6, 2017Updated 8 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆28Jun 21, 2018Updated 7 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 3 months ago
- My personal tech blog☆16Dec 13, 2024Updated last year
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- An in progress learning kernel for x86.☆14Sep 18, 2017Updated 8 years ago
- Wireless tool to communicate with IR based ESLs from a smartphone ;-)☆12Oct 15, 2024Updated last year
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Dev board for RP2040 and FUSB302B☆12Dec 20, 2023Updated 2 years ago
- ECED440 Computer Security☆11Updated this week
- Python implementation of Quadratic Sieve Algorithm.☆18Mar 8, 2023Updated 3 years ago
- Python code and data for the post "Word Segmentation, or Makingsenseofthis"☆17Oct 24, 2022Updated 3 years ago
- A simple library to interface with Gwiot 7941E RFID reader☆11Nov 2, 2020Updated 5 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Jan 8, 2017Updated 9 years ago
- ☆23May 28, 2021Updated 4 years ago