Some CTF Write-ups
☆27Feb 7, 2022Updated 4 years ago
Alternatives and similar repositories for CTF-Write-ups
Users that are interested in CTF-Write-ups are comparing it to the libraries listed below
Sorting:
- Entra ID Password Protection Banned Password Lists☆18Apr 16, 2024Updated last year
- Skywalking远程代码执行漏洞验证☆19Feb 22, 2021Updated 5 years ago
- Raw IDA Kernel API for IDAPython☆34Apr 10, 2022Updated 3 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- A Hugo theme to host Capture-The-Flag (CTF) challenges as a static website like hackropole.fr.☆18Feb 23, 2025Updated last year
- ☆15Oct 25, 2021Updated 4 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- ☆35Dec 20, 2020Updated 5 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 8 months ago
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- Website for ETHBerlin 3☆14Feb 12, 2026Updated last month
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- An educational toy fuzzer with big dreams☆12Dec 12, 2023Updated 2 years ago
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 3 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- DUST ATTACK blockchain transaction with confirmation of isomorphism for a total amount of 10000 BTC☆11Mar 11, 2026Updated last week
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- A Tool to find subdomains from hackerone reports.☆17Jun 23, 2021Updated 4 years ago
- ☆13Feb 22, 2022Updated 4 years ago
- ☆18May 9, 2020Updated 5 years ago
- ☆11May 22, 2022Updated 3 years ago
- Interval Treeset based on finger trees☆11Oct 28, 2020Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Mirror my talk materials☆47Oct 16, 2025Updated 5 months ago
- ☆105Feb 11, 2026Updated last month
- CRLF Detection based on @BlackFan 's work See link below☆16Mar 14, 2024Updated 2 years ago
- Scanner For Nginx - Remote Integer Overflow Vulnerability☆37Mar 28, 2025Updated 11 months ago
- ☆30Sep 5, 2025Updated 6 months ago
- For hosting ATS3 and developing CodeDepot☆18Mar 5, 2026Updated 2 weeks ago
- CTF Challenge☆19Nov 20, 2020Updated 5 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆40Jan 27, 2020Updated 6 years ago
- ☆13Dec 14, 2021Updated 4 years ago