Solution to CryptoHack Challenges
☆17Oct 24, 2020Updated 5 years ago
Alternatives and similar repositories for crypto-hack
Users that are interested in crypto-hack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burpsuite Extension for Jsmon☆23Apr 6, 2026Updated 3 weeks ago
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆15Mar 7, 2024Updated 2 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆40Oct 23, 2025Updated 6 months ago
- A simple lightdm web greeter for weebs.☆10Jun 14, 2023Updated 2 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆18Apr 8, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- ☆24Feb 15, 2026Updated 2 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Sep 10, 2025Updated 7 months ago
- RootMe Challenges Writeups☆12Jun 1, 2019Updated 6 years ago
- Challenges for NUS Greyhats CTF101 Web Security (2017)☆17Sep 9, 2017Updated 8 years ago
- Config files for my GitHub profile.☆14Apr 28, 2026Updated last week
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Start here - the guide to running this bootcamp☆17Oct 2, 2023Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Apr 21, 2022Updated 4 years ago
- Solutions to the Capture The Ether CTF challenges ⛳️☆15Oct 9, 2023Updated 2 years ago
- The list of write-ups, articles, and PoC of various interesting in context of OSINT☆26Mar 13, 2025Updated last year
- An implementation of VGG-M from Return of the Devil in the Details: Delving Deep into Convolutional Nets.☆12Dec 24, 2016Updated 9 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- ☆18Apr 24, 2026Updated last week
- 台大 計算機安全 (交大 程式安全) 2021 Fall☆24Feb 17, 2022Updated 4 years ago
- ekşi sözlük sitesindeki bakınızlardan ve bakınızların kullanıldığı başlıklardan oluşan açık kaynak kodlu bir proje☆10Oct 24, 2020Updated 5 years ago
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆27Mar 12, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Oct 8, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Jul 6, 2024Updated last year
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- eLearnSecurity Web application Penetration Tester eXtreme (eWPTXv2)☆28Feb 6, 2024Updated 2 years ago
- ☆32Jul 14, 2024Updated last year
- POC for CVE-2023-38646☆20Dec 7, 2023Updated 2 years ago
- Set of pre-generated pwn.college challenges☆68Jan 24, 2023Updated 3 years ago
- ☆16Dec 21, 2023Updated 2 years ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- ☆23Jul 16, 2022Updated 3 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- ☆40Jun 12, 2024Updated last year
- Labs & Code snippets for RRT on TTI☆40Nov 16, 2022Updated 3 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago