securinets-insat / Friendly-CTF-2024
Challenges, flags, solvers and writeups for the Securinets INSAT Friendly CTF edition 2024.
☆16Updated 5 months ago
Alternatives and similar repositories for Friendly-CTF-2024:
Users that are interested in Friendly-CTF-2024 are comparing it to the libraries listed below
- Challenges binaries and solutions☆4Updated 2 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆30Updated last year
- A collection of CTF write-ups focusing on web exploitation and OSINT challenges. Explore solutions, techniques, and insights from various…☆9Updated 2 weeks ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆37Updated 2 weeks ago
- Useful scripts to exploit Hack The Box retired machines/challenges☆41Updated last week
- This is Command and Control (C2) Framework (cli / c2-server / implant)☆17Updated 7 months ago
- Obsidian vault with writeups for HackTheBox/Proving Grounds boxes and cheatsheets for CPTS/OSCP preparation.☆30Updated 3 weeks ago
- x86-assembly-cheat-sheet: A must-have for quick reference in x86 Assembly. Covers fundamental concepts, instruction sets, & mem managemen…☆16Updated 6 months ago
- 🧞♂️ malware analysis☆34Updated last year
- CTF writeups maintained by TeamShakti members.☆26Updated 11 months ago
- some of the commands I usually use when doing HTB machines☆42Updated last year
- TryHackMe Roadmap☆30Updated 11 months ago
- ☆34Updated 6 months ago
- Useful scripts from past CTF challenges☆29Updated last week
- ☆20Updated last year
- Activities by RE:UN10N members☆13Updated last week
- This contains all CTF challenges from old BYU-only CTFs.☆11Updated 6 months ago
- Challenges & author writeups from ZeroDays CTF 2025.☆64Updated last week
- ☆34Updated 11 months ago
- ☆12Updated 11 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆38Updated last year
- Notes for red teamers - from cloud to Active Directory to many things in between.☆57Updated last year
- A list of all Active Directory machines from HackTheBox☆57Updated 2 months ago
- ☆37Updated last month
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆73Updated last month
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆27Updated 2 years ago
- A collection of pyjails!☆16Updated last week
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆31Updated last year
- Pure Malware Development Resource Collections☆257Updated 3 months ago