shw9453 / my-ctf-challengesView external linksLinks
shw's CTF challenges
☆27Apr 5, 2021Updated 4 years ago
Alternatives and similar repositories for my-ctf-challenges
Users that are interested in my-ctf-challenges are comparing it to the libraries listed below
Sorting:
- ☆11Nov 18, 2022Updated 3 years ago
- 以太坊单合约交易调试工具☆16Jul 20, 2021Updated 4 years ago
- RealWorld CTF 3rd billboard challenge & writeup☆27Jan 6, 2023Updated 3 years ago
- ☆18Nov 22, 2024Updated last year
- ctfs-2020☆17Mar 15, 2020Updated 5 years ago
- ☆11May 19, 2022Updated 3 years ago
- ☆10Nov 23, 2021Updated 4 years ago
- SmartAuditFlow is an AI-powered framework for automated smart contract security auditing. It combines Large Language Models (LLMs) with d…☆15Dec 19, 2025Updated last month
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Pure Rust implementation of the PLONK ZKProof System done by the Dusk-Network team.☆15Aug 10, 2020Updated 5 years ago
- It's a CLI Unity DLL Injector.☆12Aug 8, 2019Updated 6 years ago
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- ☆15May 27, 2021Updated 4 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated last year
- Blockchain Challenges Collection☆59Apr 25, 2023Updated 2 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- Testing schnorr signature scheme with a naive python implementation☆12Jul 8, 2018Updated 7 years ago
- Execution extension for reth to support indexing Arbitrum sequencer batches☆18May 5, 2024Updated last year
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- Solutions for the Matasano Crypto Challenges☆24Oct 15, 2018Updated 7 years ago
- ☆57Feb 12, 2023Updated 3 years ago
- Optimizations for Pairing-Based Cryptography☆17Sep 10, 2021Updated 4 years ago
- Auditing Applied Cryptography☆11Sep 26, 2019Updated 6 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago
- A wrapper for memory hacking related functions (WriteProcessMemory, ReadProcessMemory, etc) as well as a DLL injection function and patte…☆17May 29, 2020Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- burpplugin 根据一遍神贴,实现了一下burp插件版本的小刀,一键生成shell☆14Jul 15, 2019Updated 6 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- ☆19Jan 20, 2023Updated 3 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- forge development env for SUAVE key management☆20Aug 8, 2024Updated last year
- Unilateral fair ordering for the Ethereum protocol☆20Feb 26, 2024Updated last year
- Solidity based prover for AWS Nitro enclave attestations☆24Dec 13, 2024Updated last year
- ☆18Jun 30, 2024Updated last year
- MEV Olympics☆44Dec 1, 2024Updated last year
- SolidCTF is an infrastructure solution that simplifies the build of Solidity CTF challenges.☆154Sep 17, 2023Updated 2 years ago
- A simple and sufficient ERC721 implementation☆21Jul 11, 2022Updated 3 years ago