Tools and our test data developed for the HackAPrompt 2023 competition
☆47Oct 20, 2023Updated 2 years ago
Alternatives and similar repositories for hack-a-prompt
Users that are interested in hack-a-prompt are comparing it to the libraries listed below
Sorting:
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- ☆11Nov 1, 2023Updated 2 years ago
- This is the repository for paper "Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing"…☆16Dec 10, 2024Updated last year
- ☆17Nov 28, 2021Updated 4 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- My public CTF challenge☆17Aug 25, 2025Updated 6 months ago
- My challenges for SECCON CTF 2022 Finals☆18Feb 15, 2023Updated 3 years ago
- ☆18Aug 14, 2019Updated 6 years ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Aug 18, 2025Updated 6 months ago
- HITCON 2023 x DEVCORE Wargame☆22Aug 24, 2023Updated 2 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- rust ctf writeups(Rust CTF解题报告)☆51Jan 4, 2022Updated 4 years ago
- Find all libraries on cdn.js that pollute your prototype☆19Sep 1, 2022Updated 3 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- ☆34Aug 28, 2024Updated last year
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆33Jul 13, 2022Updated 3 years ago
- ☆28Nov 18, 2021Updated 4 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Jan 22, 2021Updated 5 years ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- Fine-tuning base models to build robust task-specific models☆34Apr 11, 2024Updated last year
- ☆36Mar 3, 2023Updated 3 years ago
- PKCS#11 Private Key Extractor☆11May 7, 2017Updated 8 years ago
- 能讓你的頁面變成火星文的 chrome 擴充套件☆32Aug 27, 2017Updated 8 years ago
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 9 months ago
- my writeups (mainly pwnable)☆35Sep 22, 2024Updated last year
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Sep 2, 2019Updated 6 years ago
- A tool which helps identifying client-side prototype polluting libraries☆39May 1, 2025Updated 10 months ago
- website of cheating daddy dot com☆17Feb 9, 2026Updated 3 weeks ago
- SkillX.sh — The Only Skill That Your AI Agent Needs. AI agent skills marketplace with semantic search, leaderboard, ratings, and CLI.☆24Feb 13, 2026Updated 2 weeks ago
- 台灣水庫即時水情與歷年統計☆15Feb 23, 2026Updated last week
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 9 months ago
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 3 years ago
- A syntactically aware search-and-replace tool for Python.☆15Jul 15, 2025Updated 7 months ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- A public repo to hold some code review challenges for RSA Conference 2022☆11Jun 3, 2022Updated 3 years ago
- ☆10Jun 5, 2023Updated 2 years ago
- generate UUID with bash scripting V1 and V4☆10Jun 10, 2021Updated 4 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- A PyTorch Extension: Tools for easy mixed precision and distributed training in Pytorch☆10Aug 13, 2024Updated last year