5kuuk / CTF-writeupsLinks
☆13Updated this week
Alternatives and similar repositories for CTF-writeups
Users that are interested in CTF-writeups are comparing it to the libraries listed below
Sorting:
- various docs (that are interesting, or not, depending on the point of view...)☆117Updated last year
- A tool for automating setup of kernel pwn challenges☆58Updated 3 weeks ago
- Write-ups for various CTF☆191Updated last year
- Collection of browser challenges☆137Updated 4 years ago
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- Easily debug processes running in docker containers☆21Updated last year
- A bunch of V8 resources (with a security focus)☆36Updated this week
- A GDB+GEF-style debugger for unloading Python pickles☆67Updated 5 months ago
- ropr with some tweaks for better linux kernel support☆20Updated 2 months ago
- FSOP Again☆23Updated 3 years ago
- ☆221Updated 2 weeks ago
- list of organizations offering vulnerability research/reverse engineering jobs☆65Updated 2 months ago
- ☆26Updated 10 months ago
- ☆20Updated this week
- Python library for CTFer☆143Updated 2 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆20Updated 4 months ago
- a new class of file structure attacks☆50Updated 2 years ago
- Automatic tool to quickly start a pwn CTF challenge☆43Updated last year
- ☆11Updated 8 months ago
- ☆46Updated last year
- ☆99Updated last year
- VirtuAlization GDb integrations in pwntools☆35Updated 2 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆72Updated 3 weeks ago
- My personnal repository☆10Updated last year
- An intuitive query API for IDA Pro☆157Updated 3 months ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆47Updated last week
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆226Updated 6 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆44Updated last year
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆41Updated last year