-
Updated
Oct 1, 2020
#
ctf
Here are 1,480 public repositories matching this topic...
A collection of hacking / penetration testing resources to make you better!
exploit
reverse-engineering
malware
mitm
hacking
owasp
penetration-testing
ctf
privilege-escalation
buffer-overflow
windows-privilege-escalation
privilege-escalation-linux
CTF framework and exploit development library
python
linux
exploit
assembly
python3
bsd
ctf
defcon
pwntools
ctf-framework
shellcode
rop
pwnable
capture-the-flag
wargame
python2
shellcoding
shellcode-development
-
Updated
Oct 3, 2020 - Python
A curated list of CTF frameworks, libraries, resources and softwares
-
Updated
Sep 28, 2020 - JavaScript
Course materials for Modern Binary Exploitation by RPISEC
-
Updated
Mar 22, 2019 - C
PHPCore1
commented
Sep 23, 2020
🐛 Bug report
Description
You can use UI-Bypass on checkout to get a negative wallet (To pay without having enough money)
(It could also get a nice Challange :)
🔬 Minimal Reproduction
GEF - GDB Enhanced Features for exploit devs & reversers
python
linux
debugging
exploit
reverse-engineering
gdb
pwn
ctf
ida-pro
binary-ninja
malware-analysis
exploit-development
-
Updated
Sep 28, 2020 - Python
disconnect3d
commented
Jul 22, 2020
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
ColdHeat
commented
Mar 30, 2019
This will help reduce some copy pasted boiler plate code.
Wiki-like CTF write-ups repository, maintained by the community. 2017
-
Updated
Dec 31, 2018 - Python
Monitor linux processes without root permissions
-
Updated
Aug 12, 2020 - Go
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
hack
hacking
cheatsheet
ctf-writeups
ctf
vulnhub
privilege-escalation
oscp
ctf-challenges
oscp-journey
oscp-prep
-
Updated
Oct 3, 2020
-
Updated
Oct 17, 2019
linux
cryptography
rubber-ducky
network
reverse-engineering
hacking
forensics
steganography
infosec
web-security
pentesting
ctf
wargame
post-exploitation
vulnerabilities
iocs
botnets
malwares
gray-hacker-resources
-
Updated
Sep 15, 2020 - C
Automatic SSRF fuzzer and exploitation tool
-
Updated
Jan 28, 2020 - Python
Writeups for HacktheBox 'boot2root' machines
-
Updated
Oct 3, 2020
China's first CTFTools framework.中国国内首个CTF工具框架,旨在帮助CTFer快速攻克难关
-
Updated
Apr 11, 2020 - Python
Venom - A Multi-hop Proxy for Penetration Testers
tunnel
golang
security
proxy
socks5
pentesting
ctf
ssh-tunnel
venom
pentest-tool
redteam
port-forward
port-reuse
-
Updated
Oct 14, 2019 - Go
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
-
Updated
Aug 3, 2020 - Python
Improve this page
Add a description, image, and links to the ctf topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the ctf topic, visit your repo's landing page and select "manage topics."
Hello spoooopyyy hackers🎃
This is a Hacktoberfest only issue!👻
Find our contributing guidelines here, this walks you through how to add a decoder / cracker!
https://github.com/Ciphey/Ciphey/wiki#adding-your-own-crackers--decoders
Don't worry if it looks hard, we will walk you through everything! :)
Write this issue in Python!
Links
These links will