AravGarg / CTFarchivesLinks
CTFs I've played so far
☆17Updated 6 months ago
Alternatives and similar repositories for CTFarchives
Users that are interested in CTFarchives are comparing it to the libraries listed below
Sorting:
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- a repo of links to useful writeups of pwn challenges☆27Updated 7 years ago
- Our team's CTF writeups☆12Updated 5 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Updated 6 years ago
- ☆49Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Some presentations I did in the past☆65Updated 2 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆26Updated 3 years ago
- ☆26Updated 4 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- ☆14Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 7 years ago
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆50Updated 3 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- qiling framework examples☆16Updated 3 years ago
- ☆78Updated 6 months ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 6 months ago
- SSD Challenges☆47Updated 2 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 3 years ago
- tools for shellcoding☆56Updated 2 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36Updated 5 years ago
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆36Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- Exploitation and Mitigation Slides☆130Updated last year
- ☆13Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- Short writeups/solvers for interesting CTF challenges.☆17Updated 2 years ago