5h3r10ck / ctf-writeupsLinks
☆13Updated 5 years ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- ☆36Updated 7 years ago
- ☆21Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- ☆20Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Just a normal flask web app to understand win32api with code snippets and references.☆75Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆65Updated 2 years ago
- ☆13Updated 6 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆78Updated 5 years ago
- #INFILTRATE20 raptor's party pack.☆30Updated 2 months ago
- A repository for my conference presentations☆35Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- The Dumb Network Fuzzer☆20Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 11 months ago
- Dockerfiles for (un)popular fuzzers!☆30Updated 5 years ago
- ☆21Updated last year
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- ☆36Updated 6 years ago
- SSD Challenges☆48Updated 3 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 3 years ago
- TAODOS stands for The Art of Denial-of-Service☆16Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- Basic tutorials for reverse engineer with radare2☆60Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago