CTF write-ups from the VulnHub CTF Team
☆10Mar 23, 2018Updated 7 years ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- Interview questions to screen offensive (red team/pentest) candidates☆12Apr 7, 2017Updated 8 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- CTF website frontend for SecGen☆21Aug 11, 2017Updated 8 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- Red Teaming Tactics and Techniques☆11Sep 11, 2020Updated 5 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 11 years ago
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆15Jul 19, 2020Updated 5 years ago
- Development repository for the freebsd cookbook☆26Mar 2, 2026Updated 2 weeks ago
- Reconnaissance scripts for penetration testing☆59Jul 7, 2015Updated 10 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Hack Cameras CCTV FREE☆17Aug 22, 2021Updated 4 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- BLEMystique is an ESP32 based custom BLE target☆14Dec 30, 2018Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- Custom firmware for DEFCON 27 badge which iterates over all types☆12Aug 11, 2019Updated 6 years ago
- 802.11 Exploitation Tool for use with Kali 2. More tools available than WHAT or WHAT Pi☆16Apr 3, 2016Updated 9 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- My dotfiles for zsh, vim, i3, polybar, alacritty ...☆25Jan 20, 2026Updated 2 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- ☆15Mar 2, 2014Updated 12 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- FROM BEGINNER TO ADVANCED FOR ALL SECURITY ENTHUSIASTS.☆18Mar 23, 2018Updated 7 years ago
- Systems and Software Security☆16Nov 13, 2025Updated 4 months ago
- ☆18Aug 8, 2016Updated 9 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆97Jan 10, 2019Updated 7 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- FOKOOS Odin5F3☆14Dec 28, 2021Updated 4 years ago
- How I setup SKR Mini E3 and BLTouch on my Ender 3☆23Oct 23, 2019Updated 6 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago