An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
-
Updated
Oct 18, 2024 - C++
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
⚡ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Image-processing software for cryo-electron microscopy
CTF Challenge Framework for Windows 8 and above
EmpireCTF – write-ups, capture the flag, cybersecurity
pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features (17->26)
Polymorphic VM and PoliCTF '17 reversing challenge.
How to write a CrackMe for a CTF competition. Source code, technical explanation, anti-debugging and anti reverse-engineering tricks.
This is an open source platform for competitions of computer security.
A tool that encrypt and hide your data inside your images.
SEETF 2022 Public Challenge Files, Sources, and Solutions
A tool that acts as an assistant for Reverse Engineering challenges in CTFs
This is the code I write for school, and some little code which is fun. Just recording what I learned.
Capture The Flag Shitty Addon
Add a description, image, and links to the ctf topic page so that developers can more easily learn about it.
To associate your repository with the ctf topic, visit your repo's landing page and select "manage topics."