praetorian-inc / ctf-writeupsView external linksLinks
Collection of Praetorian solutions to CTF challenges
☆25Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- ☆13Apr 30, 2016Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 9 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 7 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 9 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Generates a Python script to give public interface names in an ActiveX file to an IDB file.☆51Jul 16, 2021Updated 4 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- PiCube is a 4x4x4 LED cube HAT for Raspberry Pi with 5V DC operating voltage. PiCube, a monochromatic( Red, Blue, Green) LED with 64, is …☆14Jan 5, 2021Updated 5 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago