Writeups for various crackmes, CTFs, wargames, etc.
☆15Apr 21, 2017Updated 9 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Third party libraries designed to be compatible the pic32, and chipKit☆12Oct 17, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fuzzer for the Mac Kernel☆18Jan 3, 2013Updated 13 years ago
- Fuzzbunch Python-Wine wrapper☆55Apr 23, 2017Updated 9 years ago
- Open Mesh OM5P-AC v2 Unlocker (U-Boot 1.1.4 based)☆36Feb 13, 2017Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆66Jan 17, 2018Updated 8 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 4 years ago
- Text-based timesheet parser☆15Mar 25, 2021Updated 5 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- a fork of a very cool, but dormant, project at http://www.eresi-project.org/☆21Sep 13, 2012Updated 13 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Feb 13, 2017Updated 9 years ago
- C++-based shellcode builder☆115Nov 19, 2020Updated 5 years ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆50Jun 24, 2016Updated 9 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Jan 16, 2018Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Find first derivatives of functions automagically☆10Feb 21, 2017Updated 9 years ago
- Binary ninja plugins☆17Sep 15, 2016Updated 9 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- nson is a data framework for C with a very fast JSON and property list parser.☆15Dec 13, 2021Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Prototype allocator for the prevention of use-after-free attacks, as described in the S&P 2020 Paper - "MarkUs: Drop-in use-after-free pr…☆14Jan 14, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Dataspec for SII☆10Jan 4, 2017Updated 9 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year