An00bRektn / CTFLinks
Repository to place any and all scripts made to solve CTF challenges. Why solve what's already been solved?
☆13Updated last year
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- Mickey's Blogs☆39Updated 3 weeks ago
- Exploit for CVE-2023-38571☆14Updated last year
- reverse engninering & pwn writeup☆24Updated 4 years ago
- Binary exploitation exercises and scripts☆10Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- My CTF writeups☆26Updated 3 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- ☆32Updated 5 months ago
- ☆26Updated 4 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆23Updated 3 years ago
- ☆8Updated 2 years ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆58Updated 2 years ago
- Short writeups/solvers for interesting CTF challenges.☆17Updated 2 years ago
- ☆78Updated 3 months ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- How to develop your own zero day vulnerabilities for iOS☆28Updated 2 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆19Updated 4 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- Slides for presentations held at conferences☆46Updated 2 years ago
- ☆28Updated 2 years ago
- My malware analysis code snippets☆27Updated last year
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆36Updated 4 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆19Updated 2 years ago
- ☆12Updated 2 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- ☆12Updated 7 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Updated last year
- ☆15Updated last year
- ☆12Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago