Lists (4)
Sort Name ascending (A-Z)
Stars
C2C 2026 Qualifications Writeups
This is a mini repository of all CTF Jeopardy challenges from Day 2 and Day 3 of LKSN 2022. All the participants are high-schoolers and vocational high-schoolers.
Some setup scripts for security research tools.
A tool used to change the width/height property of an image
🖼️ Generate PNG files vulnerable to aCropalypse for testing and research using this easy-to-use Python script.
Easily detect and restore Acropalypse vulnerable PNG and GIF files with simple Python GUI.
A PixiJS plugin to display Live2D models of any kind (With lip-sync from audio)
A PixiJS plugin to display Live2D models of any kind.
Add Live2D widget in your website. Support Cubism 2, 3, 4
Add the Sseexxyyy live2d to your hexo!
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from …
This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.
A steganography tool for embedding payloads within Python bytecode.
A python script for digital image steganography using Fast Fourier Transform.
Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/122593277
Need help finding what room to do next if grinding points?
Audits Supabase RLS by testing anonymous key permissions for read, insert, update, and delete on all tables.
a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
Pre-Built Vulnerable Environments Based on Docker-Compose
BloodyAD is an Active Directory Privilege Escalation Framework
Impacket is a collection of Python classes for working with network protocols.
Write-up on TryHackMe Hoppers origins Side quest 0 (SQ0) - Advent of cyber 2025
The beautiful & flexible React.js docs framework.