Write ups
☆16Dec 13, 2017Updated 8 years ago
Alternatives and similar repositories for ctfs
Users that are interested in ctfs are comparing it to the libraries listed below
Sorting:
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- Timing attack resistant type systems☆24May 13, 2015Updated 10 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- python library to manage and reduce lattices☆22Feb 22, 2017Updated 9 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Multi-arch Docker images for Idris 2☆13Updated this week
- Code snippets☆11Dec 2, 2024Updated last year
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- Algebraic Data Types for perl6, inspired by Haskell☆12Jan 15, 2020Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Python wrapper extension for C Whirlpool digest reference implementation.☆20Dec 30, 2023Updated 2 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 4 months ago
- ☆12Apr 29, 2019Updated 6 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- ☆12May 9, 2017Updated 8 years ago
- Haskell library dealing with vkontakte social network☆12May 6, 2019Updated 6 years ago
- An English translation of a problem course ("Trivium") in undergraduate maths☆10Jan 25, 2023Updated 3 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Apr 15, 2019Updated 6 years ago
- Implementation 2-3 heap on C++☆11Dec 16, 2014Updated 11 years ago
- Terminal feed aggregator and launcher for Youtube channels☆10Dec 20, 2023Updated 2 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- linux kernel system call hooking☆18Dec 13, 2014Updated 11 years ago
- Mig/cctools for Linux combo makefile thingy☆32Jun 7, 2016Updated 9 years ago