psifertex / ctf-vs-the-real-worldView external linksLinks
Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise
☆65May 21, 2023Updated 2 years ago
Alternatives and similar repositories for ctf-vs-the-real-world
Users that are interested in ctf-vs-the-real-world are comparing it to the libraries listed below
Sorting:
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- ☆31Dec 5, 2024Updated last year
- JavaScript (Node) Call Flooder☆13Mar 11, 2021Updated 4 years ago
- Symbolic execution engine for Whitespace.☆13May 30, 2021Updated 4 years ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated last year
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆19May 29, 2023Updated 2 years ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆32Jan 3, 2024Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- This repository is an interactive collection of my solutions to various XSS challenges.☆13Oct 25, 2020Updated 5 years ago
- Here is a collage of reverse engineering topics that I find interesting☆16Dec 10, 2017Updated 8 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 3 years ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- justCTF 2019 challenges sources☆41Jun 9, 2021Updated 4 years ago
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- ☆18Feb 16, 2021Updated 5 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆48Oct 6, 2021Updated 4 years ago
- Collection of scripts to test your website against vulnerabilities.☆18Mar 10, 2024Updated last year
- General tips and advice for becoming interested in research, finding a suitable topic, and setting goals.☆28Mar 17, 2021Updated 4 years ago
- CTF write-ups / solution scripts☆23Nov 4, 2018Updated 7 years ago
- c99 shell , c99 shell download, c99 shell txt , c99shell☆26Jul 24, 2022Updated 3 years ago
- A tech enumeration toolkit focused on 404 Not found pages.☆25Oct 6, 2024Updated last year
- ☆22Dec 1, 2025Updated 2 months ago
- ☆50Oct 30, 2020Updated 5 years ago
- Random Exploits☆50Sep 12, 2023Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆107Apr 18, 2024Updated last year
- Labs setup for tests & experimentations☆26Aug 30, 2021Updated 4 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆31Jun 5, 2024Updated last year