All Projects → Qwaz → Solved Hacking Problem

Qwaz / Solved Hacking Problem

✔️ CTF problems and solutions solved by Qwaz

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Solved Hacking Problem

Hacker101 Ctf
Hacker101 CTF Writeup
Stars: ✭ 295 (+340.3%)
Mutual labels:  hacking, ctf
Rhme 2017
Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-2.99%)
Mutual labels:  hacking, ctf
Ctf Writeups Public
Writeups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (+394.03%)
Mutual labels:  hacking, ctf
Reverse Shell Generator
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Stars: ✭ 238 (+255.22%)
Mutual labels:  hacking, ctf
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+659.7%)
Mutual labels:  hacking, ctf
Juice Shop Ctf
Capture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (+255.22%)
Mutual labels:  hacking, ctf
Ctf Difficulty
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (+404.48%)
Mutual labels:  hacking, ctf
Privilege Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+3059.7%)
Mutual labels:  hacking, ctf
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+9258.21%)
Mutual labels:  hacking, ctf
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+532.84%)
Mutual labels:  hacking, ctf
Ctf All In One
CTF竞赛权威指南
Stars: ✭ 2,807 (+4089.55%)
Mutual labels:  hacking, ctf
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+13505.97%)
Mutual labels:  hacking, ctf
Awesome Ctf Cheatsheet
CTF Cheatsheet
Stars: ✭ 204 (+204.48%)
Mutual labels:  hacking, ctf
Ictf Framework
The iCTF Framework, presented by Shellphish!
Stars: ✭ 281 (+319.4%)
Mutual labels:  hacking, ctf
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+173.13%)
Mutual labels:  hacking, ctf
Ctf
CTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (+401.49%)
Mutual labels:  hacking, ctf
Hackerone Lessons
Transcribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (+50.75%)
Mutual labels:  hacking, ctf
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+17013.43%)
Mutual labels:  hacking, ctf
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (+516.42%)
Mutual labels:  hacking, ctf
Name That Hash
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+705.97%)
Mutual labels:  hacking, ctf

solved-hacking-problem

This is a repository which contains CTF problems and solutions solved by Qwaz.

The password for an encrypted solution is the flag of the problem.

Disclaimer

I do not own the license of problem files. They were added for readers' convenience. Please contact me if you are a problem author and want me to remove problem files from this repository.

License for solver scripts

This is free and unencumbered software released into the public domain.

Anyone is free to copy, modify, publish, use, compile, sell, or distribute this software, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means.

In jurisdictions that recognize copyright laws, the author or authors of this software dedicate any and all copyright interest in the software to the public domain. We make this dedication for the benefit of the public at large and to the detriment of our heirs and successors. We intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to this software under copyright law.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

For more information, please refer to http://unlicense.org

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].