CTF Write-ups
☆25Mar 13, 2017Updated 9 years ago
Alternatives and similar repositories for write-ups
Users that are interested in write-ups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [DEPRECATED] Cybersecurity blog (HTML, CSS, JS)☆10Nov 25, 2023Updated 2 years ago
- A simple ATM interface (My first ever Python project!)☆11Jun 20, 2022Updated 3 years ago
- This (basic) AES and RSA file encryptor provides functions to encrypt and decrypt files using the AES and RSA cryptography algorithms. I…☆13Oct 8, 2023Updated 2 years ago
- Collection of CTF challenges I made☆53Jan 3, 2025Updated last year
- This Python script uses the pyClamd library to scan a specified file for malware using ClamAV antivirus engine. If malware is detected, i…☆14Dec 28, 2023Updated 2 years ago
- Official Blog PHPID Chapter Jakarta☆20Sep 1, 2021Updated 4 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- Sentiment Analysis Python script using NLP (NLTK's VADER model) tool that analyses text data and labels them with sentiment scores.☆15Apr 2, 2024Updated last year
- [IN THE WORKS] Python script designed to provide comprehensive analysis of malware samples, combining static and dynamic analysis techniq…☆22Jul 21, 2023Updated 2 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- All Write-up pushed by RasyidMF. This repository is created for private or public learning purposes☆10Oct 16, 2020Updated 5 years ago
- CTF write-ups 2015☆19Jun 27, 2023Updated 2 years ago
- CTF(x) 2016 problem statements, files, and writeups☆16Jan 30, 2019Updated 7 years ago
- ☆13Mar 20, 2021Updated 5 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- CTF Writeups☆28Aug 15, 2024Updated last year
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- odex crc patcher☆12Sep 28, 2017Updated 8 years ago
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- ☆11Aug 3, 2022Updated 3 years ago
- API resep masakan bahasa indonesia☆11Jan 22, 2021Updated 5 years ago
- ☆11Feb 23, 2025Updated last year
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 8 years ago
- This repository is created for personal use and added tools from my blog post.☆14Aug 27, 2023Updated 2 years ago
- Latihan membuat aplikasi rest api☆11Dec 22, 2022Updated 3 years ago
- pSlip is an Android static analysis tool kit designed to find potentially vulnerable escalation paths by analyzing exported components, i…☆26Jan 24, 2026Updated last month
- Lelenime is an app for anime fans. It gives users info about anime using MyAnimeList's database. Users can search for anime titles, see t…☆11Jul 2, 2023Updated 2 years ago
- A node.js setup to demonstrate FIDO Universal 2nd Factor (U2F) authentication☆12Oct 23, 2021Updated 4 years ago
- Implementation of known practical attack on some AES variant☆16Apr 3, 2024Updated last year
- ☆13Jul 11, 2024Updated last year
- ☆10Nov 27, 2020Updated 5 years ago