Writeups for past CTFs I've joined
☆18Jun 1, 2021Updated 4 years ago
Alternatives and similar repositories for CTF-Writeups
Users that are interested in CTF-Writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Sep 7, 2020Updated 5 years ago
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Repo for colecting all my public CTF challenges☆28Dec 23, 2024Updated last year
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- Tools for studying S-boxes☆37Mar 17, 2026Updated last week
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 4 years ago
- CTF writeup for learning☆22Apr 6, 2021Updated 4 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- Solutions for the Matasano Crypto Challenges☆24Oct 15, 2018Updated 7 years ago
- Small python module for common CTF crypto functions☆168Aug 28, 2022Updated 3 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Aug 27, 2018Updated 7 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- ☆15Jun 10, 2022Updated 3 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- TokyoWesterns CTF 4th 2018 shrine☆12Aug 23, 2019Updated 6 years ago
- ☆10Jul 16, 2025Updated 8 months ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- CTF writeups☆12Aug 10, 2020Updated 5 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Stub for polymorphic code☆11Mar 18, 2023Updated 3 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 7 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Team Code Reference for programming contests☆26Jul 12, 2023Updated 2 years ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Jul 25, 2015Updated 10 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Static program slicer used in Symbiotic tool☆12Mar 31, 2025Updated 11 months ago
- A curated list of Capture The Signal CTF related stuff☆17Oct 5, 2021Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago