An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
-
Updated
Nov 3, 2025 - C++
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
⚡ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Image-processing software for cryo-electron microscopy
pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features
CTF Challenge Framework for Windows 8 and above
EmpireCTF – write-ups, capture the flag, cybersecurity
Polymorphic VM and PoliCTF '17 reversing challenge.
How to write a CrackMe for a CTF competition. Source code, technical explanation, anti-debugging and anti reverse-engineering tricks.
This is an open source platform for competitions of computer security.
A tool that encrypt and hide your data inside your images.
SEETF 2022 Public Challenge Files, Sources, and Solutions
A tool that acts as an assistant for Reverse Engineering challenges in CTFs
easily extract, edit, or analyze data from x64dbg traces (.trace32/64) and output data back into a valid .trace file or w/e format desired.
This is the code I write for school, and some little code which is fun. Just recording what I learned.
Add a description, image, and links to the ctf topic page so that developers can more easily learn about it.
To associate your repository with the ctf topic, visit your repo's landing page and select "manage topics."