0xb0bb / ctf-challsLinks
A subset of CTF challenges I have made over the years.
☆18Updated 3 years ago
Alternatives and similar repositories for ctf-challs
Users that are interested in ctf-challs are comparing it to the libraries listed below
Sorting:
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆89Updated 5 months ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 7 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- ☆116Updated 2 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆22Updated 4 years ago
- ☆35Updated 2 years ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated last month
- Cheat sheet of binary protections flags☆25Updated 5 years ago
- Leveraging patch diffing to discover new vulnerabilities☆132Updated 10 months ago
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆55Updated 3 years ago
- ☆25Updated 3 weeks ago
- ☆32Updated 2 months ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆27Updated 4 years ago
- ☆44Updated 4 years ago
- A curated list of argument injection vectors☆41Updated 7 months ago
- ☆27Updated 2 years ago
- ☆20Updated 3 years ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆45Updated 3 weeks ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆21Updated 6 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 8 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 2 years ago
- Easy to configure Honeypot for Blue Team☆43Updated 2 months ago