☆26Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for ctf-solutions
Users that are interested in ctf-solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Writeups for past CTFs I've joined☆18Jun 1, 2021Updated 4 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Challenges for INShAck 2018☆25May 11, 2019Updated 6 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆14Sep 24, 2012Updated 13 years ago
- Technical webinars on reverse engineering, malware analysis, and software protection.☆43Mar 26, 2026Updated last month
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- A Frida script to bypass Xamarin certificate pinning implementations☆75Jan 6, 2023Updated 3 years ago
- Extract .NET assemblies from Xamarin mobile applications.☆51Aug 9, 2021Updated 4 years ago
- Comment rebasing for IDA Pro☆27Apr 6, 2020Updated 6 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 8 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 5 months ago
- My personal tech blog☆17Dec 13, 2024Updated last year
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Generate strong passwords using /dev/urandom 👻☆15Aug 7, 2017Updated 8 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- Python code and data for the post "Word Segmentation, or Makingsenseofthis"☆17Oct 24, 2022Updated 3 years ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- One POV Display to rule them all!☆14Sep 29, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Jun 5, 2020Updated 5 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21May 20, 2020Updated 5 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆44Apr 11, 2025Updated last year
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Mar 26, 2020Updated 6 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23May 4, 2016Updated 9 years ago
- Simple intermediate representation language for learning and research.☆20Mar 27, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- JWT key confusion attack, i.e. re-sigining RS256 to HS256☆13May 4, 2022Updated 3 years ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 7 years ago
- Spring Boot Web with Hessian☆11Jul 2, 2014Updated 11 years ago
- ☆24Oct 11, 2019Updated 6 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- ☆10Apr 14, 2026Updated 2 weeks ago