pwn2winctf / nizkctf-tutorialLinks
Set up your own CTF with NIZKCTF
☆14Updated 7 years ago
Alternatives and similar repositories for nizkctf-tutorial
Users that are interested in nizkctf-tutorial are comparing it to the libraries listed below
Sorting:
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆36Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆27Updated 2 years ago
- Scripts I used during CTP☆67Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 5 years ago
- ☆13Updated 4 years ago
- ☆36Updated 5 years ago
- ☆20Updated 3 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆40Updated 5 years ago
- ☆20Updated 5 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆44Updated 8 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- A tool for auditing medical devices and healthcare infrastructure☆20Updated 2 years ago
- Collection of red machine learning projects☆40Updated 3 years ago
- ☆52Updated 10 months ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year