AravGarg / CTFarchivesLinks
CTFs I've played so far
☆17Updated 8 months ago
Alternatives and similar repositories for CTFarchives
Users that are interested in CTFarchives are comparing it to the libraries listed below
Sorting:
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆113Updated 6 years ago
- ☆14Updated 5 years ago
- ☆26Updated 3 years ago
- a repo of links to useful writeups of pwn challenges☆28Updated 7 years ago
- qiling framework examples☆16Updated 3 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆38Updated 5 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- RWX CTF Team Writeups☆10Updated 5 years ago
- ☆49Updated 4 years ago
- Our team's CTF writeups☆12Updated 5 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆122Updated 4 years ago
- r2con 2020 CTF kernel challenge☆12Updated 5 years ago
- Some presentations I did in the past☆65Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- auto-ropper☆17Updated 3 years ago
- Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.☆13Updated 2 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- ☆26Updated 4 years ago
- ☆172Updated 5 years ago
- Python module to help in exploitation of the FILE structure in C☆27Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆79Updated 8 months ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆103Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆108Updated 4 years ago