some tasks/solutions from CTF challenges
☆68Nov 9, 2016Updated 9 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- A repository of challenges from various CTF competitions.☆157Apr 13, 2014Updated 11 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- asp命令执行webshell☆19Oct 27, 2014Updated 11 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- CTF Writeups☆190Oct 8, 2017Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- st2-048☆40Jul 7, 2017Updated 8 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Home made trojan (c/c++)☆12Apr 14, 2023Updated 2 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- On the fly TCP and UDP network fuzzer☆16Jan 3, 2020Updated 6 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- Miscellaneous Tools☆37May 31, 2015Updated 10 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Docker-Remote-API-Exploit☆31Jan 5, 2018Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.☆572Feb 10, 2026Updated 2 weeks ago
- Fake msxfs.dll to debug ATM trojans☆55Sep 28, 2015Updated 10 years ago
- [Windows] Local Privilege Escalation - WebClient☆59May 15, 2017Updated 8 years ago
- A set of IDA Pro scripts to make Tree of Savior client reverse engineering easier☆17Dec 29, 2015Updated 10 years ago
- ☆18Oct 21, 2016Updated 9 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- ☆10Jun 1, 2014Updated 11 years ago