ctf-katana/tags

43 lines
2.5 KiB
Plaintext
Raw Normal View History

2020-09-30 23:24:44 +00:00
!_TAG_FILE_FORMAT 2 /extended format; --format=1 will not append ;" to lines/
!_TAG_FILE_SORTED 1 /0=unsorted, 1=sorted, 2=foldcase/
!_TAG_OUTPUT_FILESEP slash /slash or backslash/
!_TAG_OUTPUT_MODE u-ctags /u-ctags or e-ctags/
!_TAG_PROGRAM_AUTHOR Universal Ctags Team //
!_TAG_PROGRAM_NAME Universal Ctags /Derived from Exuberant Ctags/
!_TAG_PROGRAM_URL https://ctags.io/ /official site/
!_TAG_PROGRAM_VERSION 0.0.0 /a3c87ab5/
1433 (Microsoft SQL Server) README.md /^1433 (Microsoft SQL Server)$/;" s
445 (smb/Samba) README.md /^445 (smb\/Samba)$/;" s
APK Forensics README.md /^APK Forensics$/;" s
Binary Exploitation/pwn README.md /^Binary Exploitation\/pwn$/;" s
CTF-Katana README.md /^CTF-Katana$/;" c
Cryptography README.md /^Cryptography$/;" s
DO NOT FORGET TO JUST BRUTEFORCE JUST THE FIRST BYTE, OR TWO BYTES OR THREE BYTES. README.md /^# DO NOT FORGET TO JUST BRUTEFORCE JUST THE FIRST BYTE, OR TWO BYTES OR THREE BYTES.$/;" c
Esoteric Languages README.md /^Esoteric Languages$/;" s
Excess README.md /^Excess$/;" s
Forensics README.md /^Forensics$/;" s
IF YOU KNOW A DECENT CRIB (PLAINTEXT), USE CYBERCHEF TO HELP DETERMINE THE KEY README.md /^# IF YOU KNOW A DECENT CRIB (PLAINTEXT), USE CYBERCHEF TO HELP DETERMINE THE KEY$/;" c
Jail Breaks README.md /^Jail Breaks$/;" s
Known Exploits README.md /^Known Exploits$/;" s
Microsoft Office Macros README.md /^Microsoft Office Macros$/;" s
Miscellaneous README.md /^Miscellaneous$/;" s
Networking README.md /^Networking$/;" s
PDF Files README.md /^PDF Files$/;" s
PHP README.md /^PHP$/;" s
PNG File Forensics README.md /^PNG File Forensics$/;" s
Port Enumeration README.md /^Port Enumeration$/;" c
Post-Exploitation README.md /^Post-Exploitation$/;" c
PowerShell README.md /^PowerShell$/;" s
Python Reversing README.md /^Python Reversing$/;" s
Retrieving Network Service Hashes README.md /^Retrieving Network Service Hashes$/;" s
Reverse Engineering README.md /^Reverse Engineering$/;" s
SNMP README.md /^SNMP$/;" s
Steganography README.md /^Steganography$/;" s
Table of Contents README.md /^# Table of Contents$/;" c
Trivia README.md /^Trivia$/;" s
VisualBasicScript Reversing README.md /^VisualBasicScript Reversing$/;" s
WHEN GIVEN A FILE TO WORK WITH, DO NOT FORGET TO RUN THIS STEGHIDE WITH AN EMPTY PASSWORD! README.md /^# WHEN GIVEN A FILE TO WORK WITH, DO NOT FORGET TO RUN THIS STEGHIDE WITH AN EMPTY PASSWORD!$/;" c
Web README.md /^Web$/;" s
Windows Executables README.md /^Windows Executables$/;" s
Windows Reverse Shells README.md /^Windows Reverse Shells$/;" s