0xb0bb / ctf-challs
A subset of CTF challenges I have made over the years.
☆18Updated 2 years ago
Alternatives and similar repositories for ctf-challs:
Users that are interested in ctf-challs are comparing it to the libraries listed below
- Posts about different topics☆36Updated 10 months ago
- Materials from different CTFs for later reuse☆23Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆57Updated 2 months ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆13Updated 2 years ago
- A tool to tunnel TCP traffic over WinRM☆17Updated 3 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated last year
- A series of writes about “Binary Exploitation”.☆86Updated last year
- ☆13Updated 4 years ago
- Presentaciones de congresos☆51Updated 6 months ago
- Cheat sheet of binary protections flags☆23Updated 4 years ago
- ☆22Updated last month
- ☆45Updated 6 years ago
- ☆20Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆65Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- ☆59Updated 6 months ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- ☆16Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated last month
- Easy to configure Honeypot for Blue Team☆38Updated 7 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 11 months ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- Malware Analysis Tools☆29Updated 5 years ago
- Powershell Linter☆49Updated last month