Collection of Praetorian solutions to CTF challenges
☆25Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Apr 30, 2016Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Generates a Python script to give public interface names in an ActiveX file to an IDB file.☆53Jul 16, 2021Updated 4 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 11 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- Documentation for the angr suite☆847Apr 27, 2023Updated 2 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- This repo will contain scripts, binaries which will speed up the kernel address extraction process☆20Dec 25, 2013Updated 12 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- An IDA plugin to demangle Swift function names☆26Apr 23, 2016Updated 9 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago