Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).
☆20Jun 16, 2024Updated last year
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆19Mar 8, 2024Updated last year
- CTF writeups☆18Feb 21, 2026Updated last week
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Nov 26, 2021Updated 4 years ago
- Basic packer using XOR encryption☆31Mar 29, 2024Updated last year
- ☆26Mar 21, 2022Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- ☆32Jul 14, 2025Updated 7 months ago
- A repository of all challenges featured in the RaRCTF 2021 Capture The Flag.☆33Sep 21, 2021Updated 4 years ago
- A curated list of awesome 🏧 hacking resources.☆17Dec 4, 2025Updated 3 months ago
- This script is written in Perl this is very good admin page finder.☆11Aug 29, 2020Updated 5 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- ☆10Oct 18, 2024Updated last year
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆16Apr 24, 2023Updated 2 years ago
- ☆11Updated this week
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- tfcrypt -- high security Threefish encryption tool.☆10Aug 9, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- A curated list of Rust code and resources. With repository stars⭐ and forks🍴☆14Feb 26, 2026Updated last week
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- Lightweight, low-dependency wrapper for basic WMI functionality on Windows.☆14Jan 27, 2026Updated last month
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 3 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- Embeds messages into images using the Least Significant Bit algorithm☆11Jan 4, 2023Updated 3 years ago
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- Repository for the defense mechanism of the paper "The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"☆10Feb 10, 2022Updated 4 years ago
- Scripts used in our HackWest Pros vs Joes event☆14Mar 26, 2018Updated 7 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- A stager and implant that executes remote Web Assembly☆37Feb 4, 2026Updated last month
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago