☆10Apr 13, 2025Updated 10 months ago
Alternatives and similar repositories for 2025-writeups
Users that are interested in 2025-writeups are comparing it to the libraries listed below
Sorting:
- ☆29May 26, 2025Updated 9 months ago
- IECS213 微處理機系統☆12Dec 12, 2025Updated 2 months ago
- ctf writeups by the rounding error team ✏️☆33May 23, 2025Updated 9 months ago
- This is the official repository for files needed to complete certain challenges for DawgCTF Spring 2025.☆10Apr 19, 2025Updated 10 months ago
- ☆10Apr 26, 2025Updated 10 months ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 7 months ago
- 一個關於資訊社群的集散地☆13Sep 17, 2023Updated 2 years ago
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆39Jan 31, 2026Updated last month
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- CTF source code(s) from multiple websites.☆10May 4, 2025Updated 10 months ago
- A list of useful ressources to develop windows drivers☆18Aug 5, 2025Updated 6 months ago
- ☆14Sep 1, 2024Updated last year
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- [NeurIPS'25] Backdoor Cleaning without External Guidance in MLLM Fine-tuning☆17Oct 13, 2025Updated 4 months ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- ☆14Feb 25, 2025Updated last year
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- LinuxShell编程笔记☆15Aug 29, 2017Updated 8 years ago
- Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machin…☆18Dec 1, 2022Updated 3 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 7 months ago
- Automation for the rev/pwn experience in GDB☆14Feb 19, 2024Updated 2 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 6 months ago
- Active Directory Enumeration and Exploitation☆13Feb 3, 2026Updated last month
- Official source code and writeups for niteCTF 2023!☆14Dec 21, 2023Updated 2 years ago
- ☆18Nov 2, 2024Updated last year
- Never run out of free events to attend !☆11Oct 3, 2025Updated 5 months ago
- ☆13Mar 16, 2024Updated last year
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 5 months ago
- 修复停止维护的Vxhunter IDA插件项目在python3高些的版本下运行的若干问题☆14Aug 26, 2024Updated last year
- ☆16Apr 12, 2023Updated 2 years ago
- C++ Alt syscall hook in 25h2 can be load by KDU☆25Feb 18, 2026Updated 2 weeks ago
- Bulletproofs Implementation in Go☆17Oct 1, 2018Updated 7 years ago
- ☆15Dec 27, 2022Updated 3 years ago
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- Kernel Information Disclosure☆32Jan 13, 2026Updated last month
- All challenges and writups of the GlacierCTF 2023☆16Feb 15, 2024Updated 2 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Challenges and writeups for PatriotCTF 2024☆18Sep 28, 2024Updated last year