Solution to CryptoHack Challenges
☆17Oct 24, 2020Updated 5 years ago
Alternatives and similar repositories for crypto-hack
Users that are interested in crypto-hack are comparing it to the libraries listed below
Sorting:
- Config files for my GitHub profile.☆11Feb 26, 2026Updated last week
- Transfer Ethereum ERC20 Tokens using Golang☆13Aug 25, 2018Updated 7 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- ☆16Apr 24, 2023Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- experts☆10Dec 5, 2022Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Sep 10, 2025Updated 5 months ago
- Tools and analytics for smart derivative contracts.☆15Jan 21, 2026Updated last month
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- Python bindings to the BSCscan.com API☆11Feb 24, 2021Updated 5 years ago
- Challenges for NUS Greyhats CTF101 Web Security (2017)☆17Sep 9, 2017Updated 8 years ago
- Python implementation of Salsa20 core☆13May 10, 2013Updated 12 years ago
- Swap BTC to tBTC and transfer to ETH address anonymously.☆15Jun 3, 2022Updated 3 years ago
- ☆16Dec 21, 2023Updated 2 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- Siber Yıldız 2020 CTF Soruları ve Çözümleri☆15Dec 28, 2020Updated 5 years ago
- ☆12Jan 4, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆30Apr 9, 2022Updated 3 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- HTB (HackTheBox) write-ups and solutions for various challenges and machines, including CTF challenges in AI, Blockchain, Crypto, Hardwar…☆25Feb 25, 2026Updated last week
- jVectorMap Türkiye Haritası☆15Nov 27, 2014Updated 11 years ago
- A minimalist typing test built with NextJS☆14Mar 6, 2025Updated 11 months ago
- كنز الإسلام | منصة إلكترونية تهدف إلى تقديم محتوى إسلامي شامل☆20Jan 12, 2026Updated last month
- Documentation and cheatsheets about CTF and pentest (mirror of https://gitlab.com/xanhacks/ctf-docs).☆13Aug 23, 2023Updated 2 years ago
- DB Data and Log Backup File Auto Mover☆16Dec 15, 2020Updated 5 years ago
- Discord bot to facilitate an entire Capture the Flag competition internally. Official CTF platform of San Diego CTF.☆14May 8, 2022Updated 3 years ago
- A highly efficient and powerful Go script designed to detect sensitive data leaks in JavaScript files.☆21Dec 9, 2025Updated 2 months ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- A toolkit for CTFs☆14May 4, 2018Updated 7 years ago
- SUID systemctl exploit ( MSF - Metasploit module )☆17Oct 26, 2019Updated 6 years ago