A repository for CTF writeups
☆10Oct 8, 2016Updated 9 years ago
Alternatives and similar repositories for CTF-writeups
Users that are interested in CTF-writeups are comparing it to the libraries listed below
Sorting:
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- user space tool for inspection and simple manipulation of eBPF programs and maps☆25Feb 1, 2018Updated 8 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- Using Raspberry Pi, Python, MQTT, Home Assistant, a relay, and a magnetic proximity sensor, I open, close, stop, and report the status of…☆11Nov 7, 2016Updated 9 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Using fingerprint features to detect blood groups☆11Aug 14, 2023Updated 2 years ago
- Agent Development Kit (ADK)☆23Sep 24, 2025Updated 5 months ago
- Early (now outdated) examples. Use PMDK instead.☆58Aug 20, 2015Updated 10 years ago
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Build your own complete XNU kernel header set, replaces Kernel.framework. Gain access to kernel private structures and symbols etc with I…☆11Jun 21, 2018Updated 7 years ago
- Dress Code alpha☆25Aug 3, 2014Updated 11 years ago
- Tool for decrypting files encrypted by the SynoLocker ransomware☆15Aug 22, 2014Updated 11 years ago
- Implementation of the rough volatility model and its calibration☆10Jul 11, 2020Updated 5 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- Download Facebook Album Photos using the Graph API☆10Jun 2, 2016Updated 9 years ago
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- Whale FM archive, data☆16Mar 4, 2015Updated 10 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Source for quickstarts.teradata.com website☆14May 9, 2025Updated 9 months ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- Nginx + Lua contact form handler☆10Jun 9, 2015Updated 10 years ago
- The "Connectathon NFS tests", as published on www.connectathon.org for the Connectathon 2004 event. The test directories contain programs…☆12Jul 11, 2014Updated 11 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- ☆10Jun 2, 2020Updated 5 years ago
- ☆10Nov 23, 2021Updated 4 years ago
- A complete installed Ubuntu desktop VirtualMachine with python2 and QuantSoftwareToolkit☆16Nov 5, 2014Updated 11 years ago