randombenj / 35c3-ctf
Documentation for the 35c3 junior capture the flag event
☆11Updated 6 years ago
Alternatives and similar repositories for 35c3-ctf:
Users that are interested in 35c3-ctf are comparing it to the libraries listed below
- 36c3 junior ctf challanges☆11Updated 5 years ago
- ☆23Updated 5 years ago
- Git Workshop covering git essentials & advanced topics☆15Updated 3 years ago
- Our publications of the Swiss E-Voting Public Intrusion Test (PIT)☆47Updated 6 years ago
- Ein Repository mit einer Vorlage um die Bachelorarbeit an der Hochschule Luzern in LaTeX zu schreiben.☆35Updated 2 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- ☆37Updated 4 years ago
- ☆21Updated 2 years ago
- Stuff from CTF contests☆39Updated 5 years ago
- CTF Writeups for the UW CTF Team☆13Updated 5 years ago
- A browser add-on that adds essential features to the HSLU MyCampus website☆39Updated 2 years ago
- Template für das Web-Abstract (Bachelorarbeit HSLU)☆13Updated 4 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆27Updated 6 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- A collection of exercises, solutions, projects, summaries and more by students @ HSLU☆60Updated 2 years ago
- Phoenix☆45Updated 6 years ago
- Beobachtungen und Betrachtungen rund um das Informatik-Studium an der HSLU☆52Updated 3 years ago
- 35C3 Junior CTF pwnables☆148Updated 6 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆153Updated last year
- Scapy hands-on☆34Updated last year
- A tool for automated analysis of ctf type crypto challenges☆28Updated 5 years ago
- 34C3 Junior CTF pwnables☆117Updated 6 years ago
- Where CTFs happen☆81Updated 10 months ago
- ☆46Updated 6 years ago
- Software from the NorthSec badge☆44Updated 8 months ago
- Here are the challenges (including sources) of the GreHack CTF.☆102Updated 11 months ago
- LKRG bypass methods☆72Updated 5 years ago
- ☆13Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- Source code, descriptions and writeups of INS'hAck 2019 CTF challenges!☆33Updated 5 years ago