Some CTF Write-ups
☆27Feb 7, 2022Updated 4 years ago
Alternatives and similar repositories for CTF-Write-ups
Users that are interested in CTF-Write-ups are comparing it to the libraries listed below
Sorting:
- Skywalking远程代码执行漏洞验证☆19Feb 22, 2021Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- It's a CLI Unity DLL Injector.☆12Aug 8, 2019Updated 6 years ago
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- ☆13Jan 11, 2024Updated 2 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Raw IDA Kernel API for IDAPython☆34Apr 10, 2022Updated 3 years ago
- A wrapper for memory hacking related functions (WriteProcessMemory, ReadProcessMemory, etc) as well as a DLL injection function and patte…☆17May 29, 2020Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- ☆15Oct 25, 2021Updated 4 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- A Hugo theme to host Capture-The-Flag (CTF) challenges as a static website like hackropole.fr.☆18Feb 23, 2025Updated last year
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- CTF Challenge☆18Nov 20, 2020Updated 5 years ago
- ☆17Jan 27, 2022Updated 4 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Reverse shell using Windows Registry files (.reg)☆18Apr 7, 2020Updated 5 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- A simple KeyLogger written in Plain JavaScript. Send data to PHP server.☆21Aug 25, 2018Updated 7 years ago
- ☆18May 9, 2020Updated 5 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- A proof of concept for a clickjacking attack on macOS.☆97Feb 12, 2024Updated 2 years ago
- Protobuf file descriptor extractor☆23Jun 15, 2019Updated 6 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 2 years ago
- ☆30Sep 5, 2025Updated 5 months ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago