Official challenge and writeup repository for RITSEC CTF 2018.
☆16Nov 30, 2018Updated 7 years ago
Alternatives and similar repositories for RITSEC-CTF-2018
Users that are interested in RITSEC-CTF-2018 are comparing it to the libraries listed below
Sorting:
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- ☆15Oct 9, 2021Updated 4 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- ☆21Nov 3, 2018Updated 7 years ago
- writeup & exploits☆39May 3, 2021Updated 4 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- A simple system for hosting competitive programming contests.☆23Nov 20, 2025Updated 3 months ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆49Feb 15, 2017Updated 9 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- ☆25Mar 18, 2018Updated 7 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Jan 18, 2018Updated 8 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- AI Agent for Threat Modeling☆13May 27, 2025Updated 9 months ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 3 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 9 months ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Multi-instance IDA Pro MCP server — analyze multiple binaries simultaneously through a single MCP endpoint.☆39Updated this week
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- [Forked] This repo is for learning various heap exploitation techniques.☆10Sep 6, 2018Updated 7 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- A collection of tools, documents, articles, blog posts, interviews, videos and many others!☆14Oct 10, 2024Updated last year
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- A simple example of using Tile38 to track the ISS and send notifications when it's overhead.☆10Sep 4, 2018Updated 7 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆12Aug 25, 2021Updated 4 years ago