Leak other players' temporary workspaces for ctf and wargames.
☆86Jan 17, 2023Updated 3 years ago
Alternatives and similar repositories for tmpleak
Users that are interested in tmpleak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.☆69Jan 17, 2023Updated 3 years ago
- ☆27Apr 6, 2018Updated 8 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Some loader module for IDA☆35Feb 21, 2017Updated 9 years ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Small scripts to simplify network communication☆27Dec 27, 2020Updated 5 years ago
- Implementation of Korean Block Ciphers: NEAT and NES☆31Jun 19, 2017Updated 8 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- defcon framework by SeoulPlusBadass☆18Dec 11, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- [WIP] pivot a running process into an emulator for instrumentation☆13Aug 12, 2016Updated 9 years ago
- Java class name obfuscation via classloader segregation and graph colouring☆18Jul 4, 2017Updated 8 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- Stereotyped Challenges (2014~2023)☆84Jan 17, 2023Updated 3 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- Predicting League of Legend Game Results with ML☆16Apr 20, 2017Updated 8 years ago
- A deflate compressor that emits compressed data that is in the [A-Za-z0-9] ASCII byte range.☆177Jan 13, 2015Updated 11 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- 기술만 입력해서 예쁜 이력서를 만들어보자☆25Jun 10, 2021Updated 4 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- various CTF writeups☆61Jun 28, 2018Updated 7 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ctfwriteup☆25Mar 27, 2019Updated 7 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- My CTF challenges (2018~)☆28Sep 17, 2023Updated 2 years ago
- ☆11May 7, 2019Updated 6 years ago
- CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines (NDSS '19)☆242Nov 11, 2019Updated 6 years ago
- Packages for IDA Pro (written in python but supports all)☆133Jan 4, 2021Updated 5 years ago
- JavaScript Obfuscation Tool☆18Oct 4, 2019Updated 6 years ago