s1gh / ctf-literatureView external linksLinks
Collection of free books, papers and articles related to CTF challenges.
☆385Feb 22, 2019Updated 6 years ago
Alternatives and similar repositories for ctf-literature
Users that are interested in ctf-literature are comparing it to the libraries listed below
Sorting:
- Exploit web-vulnerabilities☆23Apr 9, 2019Updated 6 years ago
- C++ implementation of ELA to detect any external changes made to an image through an image editing software☆12Nov 18, 2019Updated 6 years ago
- A small course on CTF (wargames) for beginners [in Russian]☆278Dec 26, 2021Updated 4 years ago
- Presence application built during Microsoft's Code.Fun.Do 2k18☆25Oct 30, 2018Updated 7 years ago
- Tools of the trade☆85Sep 6, 2022Updated 3 years ago
- A clean and simple go version manager.☆21Jan 10, 2020Updated 6 years ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Sep 5, 2020Updated 5 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- It deobfuscates JSFuck into readable JavaScript☆41Feb 27, 2018Updated 7 years ago
- ASN.1 BER codec and compiler (C/Python) for embedded/small systems☆15Jul 27, 2015Updated 10 years ago
- Reversing list☆150Jan 9, 2024Updated 2 years ago
- Security tool to detect dns poisoning attacks☆49Dec 17, 2014Updated 11 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 7 years ago
- Stuff to read up☆251Aug 14, 2020Updated 5 years ago
- CTF write-ups from the VulnHub CTF Team☆718Apr 2, 2018Updated 7 years ago
- Simple single cycle RISC processor written in Verilog☆49Mar 23, 2018Updated 7 years ago
- A library of common data structures or algorithms. Used mainly in programming contests.☆40Jun 11, 2024Updated last year
- Coverage gathering JVMTI agent for Android☆26Oct 11, 2023Updated 2 years ago
- Script to help enumerate and dig through Github and Github Enterprise installations.☆15Nov 30, 2018Updated 7 years ago
- Yet Another Personal Assistant (YAPA)☆14May 29, 2018Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,004Aug 27, 2022Updated 3 years ago
- XSS Cheatsheet - A collection of XSS attack vectors https://xss.devwerks.net/☆34Oct 10, 2019Updated 6 years ago
- Security Tool to detect arp poisoning attacks☆54Apr 15, 2018Updated 7 years ago
- Lecture and exercises on CTF crypto tasks☆18Apr 16, 2014Updated 11 years ago
- A VR game where the player must shoot cannon balls at giant zombies to save the IITR Main Building☆15Apr 5, 2018Updated 7 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Some setup scripts for security research tools.☆9,284Feb 9, 2026Updated last week
- Hassle free .gitignore manager☆35Jul 14, 2019Updated 6 years ago
- Challenges for Binary Exploitation Workshop☆631Oct 2, 2022Updated 3 years ago
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- CSAW CTF 2016 Finals☆13Dec 1, 2016Updated 9 years ago
- Collection of CTF Web challenges I made☆2,821Aug 31, 2025Updated 5 months ago
- A repository of challenges from various CTF competitions.☆157Apr 13, 2014Updated 11 years ago
- My old portfolio, my previous small personal slice of the Internet☆11Jul 3, 2021Updated 4 years ago
- Get the UTI (Uniform Type Identifier) of a file on macOS☆23Aug 12, 2021Updated 4 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- An experimental OS developed to learn about the internal concepts☆15May 29, 2017Updated 8 years ago
- A general collection of information, tools, and tips regarding CTFs and similar security competitions☆1,810Feb 25, 2021Updated 4 years ago
- Writeups for different CTF challenges☆70Mar 25, 2025Updated 10 months ago