Vulnerable app with examples showing how to not use secrets
-
Updated
Jun 1, 2024 - Java
Vulnerable app with examples showing how to not use secrets
Welcome to TheCyberHUB, a community-driven platform for hackers, cybersecurity enthusiasts, and IT professionals. Our platform provides a variety of free resources, including Capture The Flag (CTF) challenges, courses, blogs, forums, and much more.
Collection of multiple cyber security notes. Notes include vulnerabilities, techniques, tools, site and other stuff.
My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.
【Hello CTF】题目配套,免费开源的CTF入门教程,针对0基础新手编写,同时兼顾信息差的填补,对各阶段的CTFer都友好的开源教程,致力于CTF和网络安全的开源生态!
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
基于kotlin+tornadoFx的跨平台密码学工具箱.包含编解码,编码转换,加解密, 哈希,MAC,签名,大数运算,压缩,二维码功能,ctf等实用功能,支持插件
Useful scripts to exploit Hack The Box retired machines/challenges
Programs and or walkthroughs relating to PicoCTF (https://picoctf.org/)
All of my CTF(THM, HTB, pentesterlab, vulnhub etc.) wirte-ups & notes
Kind of writeups for web3 CTFs & challenges
OFRAK: unpack, modify, and repack binaries.
Add a description, image, and links to the ctf topic page so that developers can more easily learn about it.
To associate your repository with the ctf topic, visit your repo's landing page and select "manage topics."