Some CTF Write-ups
☆27Feb 7, 2022Updated 4 years ago
Alternatives and similar repositories for CTF-Write-ups
Users that are interested in CTF-Write-ups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Entra ID Password Protection Banned Password Lists☆18Apr 16, 2024Updated last year
- Skywalking远程代码执行漏洞验证☆19Feb 22, 2021Updated 5 years ago
- Raw IDA Kernel API for IDAPython☆34Apr 10, 2022Updated 4 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Hugo theme to host Capture-The-Flag (CTF) challenges as a static website like hackropole.fr.☆18Feb 23, 2025Updated last year
- ☆15Oct 25, 2021Updated 4 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- ☆35Dec 20, 2020Updated 5 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆17Oct 24, 2020Updated 5 years ago
- ☆28Oct 18, 2022Updated 3 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 8 months ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- NX Launcher+ is a Nintendo Switch-looking game and app launcher for Windows! (not mantained anymore)☆11Feb 17, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- A proof of concept for a clickjacking attack on macOS.☆97Feb 12, 2024Updated 2 years ago
- It's a CLI Unity DLL Injector.☆12Aug 8, 2019Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- burpplugin 根据一遍神贴,实现了一下burp插件版本的小刀,一键生成shell☆14Jul 15, 2019Updated 6 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 4 months ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- ☆13Jan 11, 2024Updated 2 years ago
- A tool to decrypt all Synology encrypted archives (SPK, PAT, ...)☆20Jun 6, 2025Updated 10 months ago
- A Tool to find subdomains from hackerone reports.☆17Jun 23, 2021Updated 4 years ago
- ☆13Feb 22, 2022Updated 4 years ago
- A wrapper for memory hacking related functions (WriteProcessMemory, ReadProcessMemory, etc) as well as a DLL injection function and patte…☆17May 29, 2020Updated 5 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- ☆18May 9, 2020Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Mirror my talk materials☆47Oct 16, 2025Updated 5 months ago
- ☆105Feb 11, 2026Updated 2 months ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- CRLF Detection based on @BlackFan 's work See link below☆17Mar 14, 2024Updated 2 years ago
- ☆30Sep 5, 2025Updated 7 months ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago