☆26Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for ctf-solutions
Users that are interested in ctf-solutions are comparing it to the libraries listed below
Sorting:
- ☆12Feb 24, 2023Updated 3 years ago
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 7 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 3 months ago
- ☆11Jun 5, 2020Updated 5 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- My personal tech blog☆16Dec 13, 2024Updated last year
- ☆35Aug 29, 2012Updated 13 years ago
- Generate strong passwords using /dev/urandom 👻☆15Aug 7, 2017Updated 8 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- FactorDB client library with Python☆54Apr 10, 2023Updated 2 years ago
- Python code and data for the post "Word Segmentation, or Makingsenseofthis"☆17Oct 24, 2022Updated 3 years ago
- Learn how to pwn badly written programs☆15Sep 18, 2018Updated 7 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- AES-128 and DES differential fault analysis☆16Jan 20, 2021Updated 5 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- An in progress learning kernel for x86.☆14Sep 18, 2017Updated 8 years ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆20Jun 8, 2021Updated 4 years ago
- An AVR emulator☆17May 16, 2016Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Python implementation of Quadratic Sieve Algorithm.☆18Mar 8, 2023Updated 2 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆25Dec 19, 2023Updated 2 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- ☆23May 28, 2021Updated 4 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23May 4, 2016Updated 9 years ago
- Examples of Static and Dynamic Thread Local Storage Callback Creation☆24Apr 6, 2017Updated 8 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Feb 17, 2026Updated 2 weeks ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- c0r0n4con talk 12 april 2020☆23Apr 13, 2020Updated 5 years ago
- Tool to merge identical SQLite3 databases☆19Nov 22, 2019Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- ☆24Jan 21, 2022Updated 4 years ago
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago