0xb0bb / ctf-challs
A subset of CTF challenges I have made over the years.
☆18Updated 2 years ago
Alternatives and similar repositories for ctf-challs:
Users that are interested in ctf-challs are comparing it to the libraries listed below
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆60Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- ☆49Updated 6 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- A Pwning Toolkit☆28Updated 2 months ago
- OSED course preparation materials.☆11Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month
- Review of AWAE.OSWE☆31Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆56Updated last year
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Presentaciones de congresos☆52Updated 9 months ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆18Updated 2 years ago
- material for exploit development☆17Updated 5 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆61Updated 4 months ago
- ☆61Updated 8 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- ☆32Updated last month
- ☆36Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Posts about different topics☆36Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- Gonna share my writeups and resources here☆64Updated 2 months ago