some tasks/solutions from CTF challenges
☆68Nov 9, 2016Updated 9 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- A repository of challenges from various CTF competitions.☆157Apr 13, 2014Updated 11 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- CTF Writeups☆190Oct 8, 2017Updated 8 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- On the fly TCP and UDP network fuzzer☆16Jan 3, 2020Updated 6 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- A writeup summary for CTF competitions, problems.☆351Sep 4, 2024Updated last year
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.☆573Feb 10, 2026Updated last month
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Miscellaneous Tools☆37May 31, 2015Updated 10 years ago
- Writeups for CTF competitions.☆33May 24, 2016Updated 9 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- Home made trojan (c/c++)☆12Apr 14, 2023Updated 2 years ago
- Non-Alphanumeric Ruby for Fun and Not Much Else☆21Mar 19, 2014Updated 12 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- A bot that offers sympathy to people who have suffered paper cuts.☆17Oct 6, 2012Updated 13 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Jun 7, 2017Updated 8 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- CTF write-ups from the VulnHub CTF Team☆718Apr 2, 2018Updated 7 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- ☆10Jun 1, 2014Updated 11 years ago