I used github and then moved to medium to share my cybersecurity writeups. However, I no longer use either platform. As a result, I am currently developing my own blog to circumvent any subscription fees associated with medium.
☆18Oct 30, 2021Updated 4 years ago
Alternatives and similar repositories for capture-the-flag
Users that are interested in capture-the-flag are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 4 years ago
- Ejercicios práticos para aprender Docker☆22Jan 27, 2021Updated 5 years ago
- Just another design patterns repository, but this time more TDD oriented and compiling samples in multiple programming languages.☆26Dec 21, 2023Updated 2 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 11 years ago
- Slides and other material from various conference presentations.☆46Sep 10, 2025Updated 7 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆10Dec 2, 2021Updated 4 years ago
- Repositorio para las prácticas y proyectos de la materia de Diseño y Arquitectura de Software☆50May 23, 2023Updated 2 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆55Nov 1, 2018Updated 7 years ago
- Minimalist resources to learn about **OSINT**, tips, tools, and others..☆30Oct 27, 2022Updated 3 years ago
- Port of libgcov portions to enable a way to generate GCDA files for embedded systems☆34Nov 5, 2016Updated 9 years ago
- An Overly Complex Random Number Generator, created to demystify how containers work.☆24Jan 5, 2023Updated 3 years ago
- A web application for generating custom XSS payloads☆79Dec 29, 2019Updated 6 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆151Mar 2, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Writeups of Capture The Flag Competitions☆124Jul 13, 2022Updated 3 years ago
- Collection of Pentest Notes and Cheatsheets☆396Jun 25, 2025Updated 9 months ago
- Hexagonal Architecture implemented in GO☆44Aug 6, 2021Updated 4 years ago
- PE Injection、DLL Injection、Process Injection、Thread Injection、Code Injection、Shellcode Injection、ELF Injection、Dylib Injection, including…☆566May 25, 2020Updated 5 years ago
- To store some CTF_pwn_bins and exploits for self-practice☆462Nov 27, 2020Updated 5 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59May 16, 2021Updated 4 years ago
- The Gopher API, is a simple CRUD API for formative purpose, we're building it while writing the posts of the blog.☆80Jan 2, 2026Updated 3 months ago
- Parse and modify Go struct field tags☆652Sep 7, 2023Updated 2 years ago
- A comprehensive, easy-to-follow ebook to learn everything from the basics of JavaScript to ES2022. Read more on my blog https://inspiredw…☆1,058May 22, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🥧 Set of React Native components☆189Aug 14, 2022Updated 3 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,822Jun 8, 2019Updated 6 years ago
- Materials for OSCP exam☆398Jan 4, 2024Updated 2 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,107May 27, 2022Updated 3 years ago
- WARNING: This app contains security vulnerabilities. AltoroJ is a sample banking J2EE web application. It shows what happens when web app…☆287Jul 23, 2024Updated last year
- Advanced skinning plugin for IDA Pro☆933Jun 26, 2019Updated 6 years ago
- Go Todo Backend example using modular project layout for product microservice.☆335May 31, 2023Updated 2 years ago
- ☆386Apr 13, 2024Updated 2 years ago
- Steganography brute-force utility to uncover hidden data inside files☆594Dec 25, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- FlatList based timeline component for React Native for iOS and Android☆508Mar 29, 2026Updated 2 weeks ago
- Default net/http wrapper to automatically generate RESTful API documentation with Swagger 2.0.☆564Sep 2, 2025Updated 7 months ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,796Apr 3, 2024Updated 2 years ago
- A collection of links related to Linux kernel security and exploitation☆6,399Mar 7, 2026Updated last month
- Penelope Shell Handler☆1,635Apr 7, 2026Updated last week
- A sorted and updated list of security wargame sites.☆1,193Feb 27, 2026Updated last month