0xb0bb / ctf-challsLinks
A subset of CTF challenges I have made over the years.
☆18Updated 2 years ago
Alternatives and similar repositories for ctf-challs
Users that are interested in ctf-challs are comparing it to the libraries listed below
Sorting:
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- ☆37Updated 2 years ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆76Updated last month
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆86Updated 3 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆22Updated 4 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 5 months ago
- Presentaciones de congresos☆53Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆45Updated 3 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- Easy to configure Honeypot for Blue Team☆41Updated 3 weeks ago
- Posts about different topics☆36Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- Ansible build for Afl++ Frida-Mode☆24Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 5 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- ☆32Updated last month
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago