An00bRektn / CTFLinks
Repository to place any and all scripts made to solve CTF challenges. Why solve what's already been solved?
☆13Updated last year
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- ☆79Updated 7 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Updated last year
- ☆33Updated 9 months ago
- MacOSX Privilege Escalation Research☆30Updated 4 years ago
- Short writeups/solvers for interesting CTF challenges.☆17Updated 2 years ago
- ☆12Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 3 years ago
- My malware analysis code snippets☆29Updated 2 years ago
- ☆19Updated 2 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆24Updated 4 years ago
- Fork of rsakeyfind☆21Updated 8 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- macOS Security Research☆119Updated last year
- This repository contains multiple exploits I have written for various CVEs and CTFs☆28Updated 2 months ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆27Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Slides and other material from various conference presentations.☆46Updated last month
- ☆15Updated last year
- Currently proof-of-concept☆17Updated 3 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Updated 2 years ago
- ☆30Updated 2 months ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Updated 3 years ago
- ☆45Updated 2 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Updated 4 years ago
- ☆15Updated 3 years ago
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆37Updated 3 months ago
- ☆29Updated last month
- ☆14Updated 2 years ago
- ☆37Updated 2 years ago