xanhacks / ctf-docs
Documentation and cheatsheets about CTF and pentest (mirror of https://gitlab.com/xanhacks/ctf-docs).
☆11Updated last year
Alternatives and similar repositories for ctf-docs:
Users that are interested in ctf-docs are comparing it to the libraries listed below
- ☆36Updated last year
- Materials from different CTFs for later reuse☆23Updated last year
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆136Updated 2 months ago
- Source code and writeups for all challenges☆16Updated 2 years ago
- Set of pre-generated pwn.college challenges☆62Updated last year
- Security Research☆41Updated 2 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆46Updated 2 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated last month
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆11Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆82Updated last month
- A series of writes about “Binary Exploitation”.☆86Updated last year
- DCTF 2022 Challenge and infrastructure repository☆10Updated 8 months ago
- ☆46Updated 8 months ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆96Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- ☆17Updated last year
- Gonna share my writeups and resources here☆60Updated this week
- Write ups for Ph0wn CTF☆40Updated last month
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆99Updated 2 years ago
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- ☆32Updated last week
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆46Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- ☆18Updated 3 years ago
- ☆43Updated 2 years ago
- Pour nos write ups de CTF ou Rhacklettes party☆22Updated 5 years ago
- Custom CTFd Dark Theme☆23Updated 3 years ago
- Source code and solution of CTF challenges that I created.☆45Updated 7 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆38Updated last year