CTF/Cyber Security learning source from beginner to neutral level
☆44Apr 18, 2025Updated 10 months ago
Alternatives and similar repositories for CTF-Cyber-Security-Source
Users that are interested in CTF-Cyber-Security-Source are comparing it to the libraries listed below
Sorting:
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- Extract texts + their page numbers from PDF☆12Nov 25, 2024Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- 定制化密码字典生成器 Customized password dictionary generator☆11Nov 2, 2020Updated 5 years ago
- Top 10 million and top ~800 million passwords sorted from the newest breach compilation (leaked early 2019 and and a total of 3.2 Billio…☆12May 30, 2020Updated 5 years ago
- An OSINT tool for discovering domains, organizations, and addresses from SSL/TLS certificates using crt.sh. Supports proxy configurations…☆12Jun 18, 2025Updated 8 months ago
- Bit level timing calculator for CAN/CANFD☆12Mar 30, 2022Updated 3 years ago
- ☆13Dec 6, 2020Updated 5 years ago
- ☆14Apr 11, 2020Updated 5 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Links Panel, collecting all the links on a page☆16Jun 19, 2025Updated 8 months ago
- Automation for the rev/pwn experience in GDB☆14Feb 19, 2024Updated 2 years ago
- Food delivery cross-platform mobile app made with React Native and Expo☆15Oct 11, 2022Updated 3 years ago
- ☆12May 28, 2023Updated 2 years ago
- Malware-Analysis-Kit☆14Aug 3, 2015Updated 10 years ago
- Identify vulnerabilities in your API's using the OpenAPI Security Scanner☆12Dec 6, 2018Updated 7 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- 🔸 Best Folder Structure For Every React Native Project ... 🔸 In This Repo We Are Demonstrate How To Structure And Manage Your React Nat…☆13Oct 31, 2021Updated 4 years ago
- ☆12Jun 8, 2018Updated 7 years ago
- Web应用程序安全性和Pentest / CTF的有用负载和绕过列表☆12Oct 26, 2019Updated 6 years ago
- Python module wrapping Bindiff usage into a Python API.☆22Jan 20, 2026Updated last month
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- Skills To Improve Before Heading to OSCP☆15May 14, 2017Updated 8 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- ctf challenge solutions☆15Jul 28, 2024Updated last year
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- Sample language selector made with Tailwind and NextJS☆17Mar 9, 2023Updated 2 years ago
- ☆21Nov 14, 2024Updated last year
- ☆19Apr 28, 2025Updated 10 months ago
- Minimal PS4 5.05 jailbreak on a ESP8266. Compiles in the Arduino IDE.☆16Jan 4, 2022Updated 4 years ago
- Useful Alfred Snippets for Pentest☆18Dec 5, 2024Updated last year
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆70Aug 22, 2022Updated 3 years ago
- ☆15May 18, 2017Updated 8 years ago