securinets-insat / Friendly-CTF-2024Links
Challenges, flags, solvers and writeups for the Securinets INSAT Friendly CTF edition 2024.
☆18Updated 9 months ago
Alternatives and similar repositories for Friendly-CTF-2024
Users that are interested in Friendly-CTF-2024 are comparing it to the libraries listed below
Sorting:
- A list of useful tools for Malware Analysis (will be updated regularly)☆142Updated 10 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆50Updated 3 months ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆19Updated 9 months ago
- ☆37Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆88Updated last month
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 11 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆83Updated 4 months ago
- Reverse Shell - technique is commonly used in cyber attacks☆16Updated last year
- A collection of CTF write-ups focusing on web exploitation and OSINT challenges. Explore solutions, techniques, and insights from various…☆9Updated 4 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated 2 months ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- Telegram video (mp4) extension manipulation PoC☆93Updated 4 months ago
- Collection of codes focused on Linux rootkits☆133Updated last month
- Some of my Malware Analysis writeups☆46Updated 2 years ago
- ☆42Updated last year
- Yandex browser password recovery☆11Updated 3 months ago
- execute PE in memory Filelessly☆43Updated 5 months ago
- Malicious computer worm Stuxnet and drivers☆65Updated 3 years ago
- ☆157Updated 4 months ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆87Updated 8 months ago
- 🧞♂️ malware analysis☆37Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆70Updated 5 months ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆106Updated last year
- Notes for red teamers - from cloud to Active Directory to many things in between.☆60Updated last year
- Cybersecurity research results. Simple C/C++ and Python implementations☆246Updated this week
- Awesome Privilege Escalation☆115Updated 2 years ago
- Pure Malware Development Resource Collections☆317Updated 6 months ago
- ☆39Updated 3 weeks ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆61Updated 10 months ago
- ☆77Updated last year