Write ups
☆16Dec 13, 2017Updated 8 years ago
Alternatives and similar repositories for ctfs
Users that are interested in ctfs are comparing it to the libraries listed below
Sorting:
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- Try harder to bypass that WAF...☆13Jan 4, 2015Updated 11 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆14Feb 14, 2017Updated 9 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- ☆15Apr 9, 2018Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- Simple and old virtual machine☆17Apr 28, 2016Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆109Jul 26, 2016Updated 9 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- Personal repository for all ctf related stuffs☆67Nov 9, 2024Updated last year
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Tools, documentation and scripts to move projects from IDA to R2 and viceversa☆136Oct 28, 2019Updated 6 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Aug 5, 2015Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Vulnerability Reports by Aleph Research☆36Mar 10, 2024Updated last year
- utilities☆15Jul 2, 2013Updated 12 years ago
- Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. …☆46Sep 30, 2013Updated 12 years ago
- 🕰 Easily insert current stamp, time, date and datetime in Sublime Text☆12Jun 28, 2018Updated 7 years ago
- Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is a…☆42Feb 8, 2018Updated 8 years ago
- ☆89Sep 27, 2024Updated last year
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Android lockscreen password cracker via ADB (Tested only on Asus Zenfone 4 A450CG )☆10Jul 3, 2017Updated 8 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Docker Pets is a simple application that's useful for testing out features of Docker Enterprise Edition.☆12Jul 10, 2017Updated 8 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago