-
Updated
Aug 10, 2020
#
ctf
Here are 1,403 public repositories matching this topic...
A collection of hacking / penetration testing resources to make you better!
exploit
reverse-engineering
malware
mitm
hacking
owasp
penetration-testing
ctf
privilege-escalation
buffer-overflow
windows-privilege-escalation
privilege-escalation-linux
CTF framework and exploit development library
python
linux
exploit
assembly
python3
bsd
ctf
defcon
pwntools
ctf-framework
shellcode
rop
pwnable
capture-the-flag
wargame
python2
shellcoding
shellcode-development
-
Updated
Aug 24, 2020 - Python
A curated list of CTF frameworks, libraries, resources and softwares
-
Updated
Aug 13, 2020 - JavaScript
Course materials for Modern Binary Exploitation by RPISEC
-
Updated
Mar 22, 2019 - C
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
javascript
hacking
owasp
application-security
pentesting
ctf
vulnerable
appsec
owasp-top-10
owasp-top-ten
vulnapp
-
Updated
Aug 23, 2020 - JavaScript
GEF - GDB Enhanced Features for exploit devs & reversers
python
linux
debugging
exploit
reverse-engineering
gdb
pwn
ctf
ida-pro
binary-ninja
malware-analysis
exploit-development
-
Updated
Aug 26, 2020 - Python
ColdHeat
commented
Mar 30, 2019
This will help reduce some copy pasted boiler plate code.
TheAlcanian
commented
Jul 29, 2020
Describe the bug
When running Ciphey on a base64-encoded file using the -
command-line parameter, Ciphey picks up and decodes the base64-encoded file's contents, and prints the decoded content like normal. When running Ciphey on a base64-encoded file using the -i
command-line parameter, Ciphey finds no results.
To Reproduce
Steps to reproduce the behavior:
- What input did you u
Wiki-like CTF write-ups repository, maintained by the community. 2017
-
Updated
Dec 31, 2018 - Python
Monitor linux processes without root permissions
-
Updated
Aug 12, 2020 - Go
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
hack
hacking
cheatsheet
ctf-writeups
ctf
vulnhub
privilege-escalation
oscp
ctf-challenges
oscp-journey
oscp-prep
-
Updated
May 21, 2020
-
Updated
Oct 17, 2019
linux
cryptography
rubber-ducky
network
reverse-engineering
hacking
forensics
steganography
infosec
web-security
pentesting
ctf
wargame
post-exploitation
vulnerabilities
iocs
botnets
malwares
gray-hacker-resources
-
Updated
May 19, 2020 - C
Automatic SSRF fuzzer and exploitation tool
-
Updated
Jan 28, 2020 - Python
Writeups for HacktheBox 'boot2root' machines
-
Updated
Aug 24, 2020
China's first CTFTools framework.中国国内首个CTF工具框架,旨在帮助CTFer快速攻克难关
-
Updated
Apr 11, 2020 - Python
Venom - A Multi-hop Proxy for Penetration Testers
tunnel
golang
security
proxy
socks5
pentesting
ctf
ssh-tunnel
venom
pentest-tool
redteam
port-forward
port-reuse
-
Updated
Oct 14, 2019 - Go
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
-
Updated
Aug 3, 2020 - Python
Improve this page
Add a description, image, and links to the ctf topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the ctf topic, visit your repo's landing page and select "manage topics."
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions