eastXueLian's reservoir of CTF puzzles.
☆16Nov 27, 2024Updated last year
Alternatives and similar repositories for ctf-writeup-collection
Users that are interested in ctf-writeup-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 11 months ago
- ☆103Dec 17, 2025Updated 3 months ago
- Exploit scripts for ctf challenges that involves linux kernel pwning☆17Dec 10, 2024Updated last year
- A pwn learning repo containing multiple pwn program codes.☆36Mar 11, 2026Updated last month
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- For V8CTF M123☆17Aug 25, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 5 months ago
- A collection of web browser CTF challenges and solutions.☆33Dec 30, 2022Updated 3 years ago
- ☆34Apr 14, 2025Updated last year
- ☆38May 10, 2024Updated last year
- ☆16Apr 17, 2024Updated last year
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated last year
- Archive of AAA CTF 2025 (XCTF competition)☆12May 7, 2025Updated 11 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Jul 9, 2025Updated 9 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- My browser pwn collections. Mainly JavaScript engine stuff.☆34Mar 12, 2026Updated last month
- some ida script☆33Aug 18, 2021Updated 4 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆64Dec 12, 2023Updated 2 years ago
- Agentic malware analysis environment with MCP-connected disassemblers, RE tooling, and structured workflows for Claude Code and Codex CLI…☆188Mar 22, 2026Updated 3 weeks ago
- Insert in db an passwords list☆24Oct 5, 2024Updated last year
- 华师CTF 2019 新生赛题目☆20Dec 9, 2019Updated 6 years ago
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆13Mar 9, 2022Updated 4 years ago
- Linux kernel privilege escalation techniques☆153Aug 9, 2024Updated last year
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆278Aug 2, 2025Updated 8 months ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- 《恶意代码分析实战》实验的个人题解:https://hansimov.gitbook.io/malware-analysis/☆11Nov 14, 2020Updated 5 years ago
- ☆11Sep 6, 2024Updated last year
- 零基础入门V8引擎漏洞挖掘☆286Apr 8, 2024Updated 2 years ago
- Writeups for some CTF challenges. I keep the copy of task files in case you would like to try them yourself.☆12Oct 4, 2021Updated 4 years ago
- Applies ROME and MEMIT on Mamba-S4 models☆14Apr 5, 2024Updated 2 years ago
- A V8 Sandbox Escape Technique.☆34Jul 4, 2024Updated last year
- Rustで作成されたバイナリのリバースエンジニアリング調査レポート☆64Dec 1, 2025Updated 4 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- 一个用于测试不同 WAF (Web Application Firewall) 对 payload 拦截情况的工具☆18Mar 18, 2026Updated 3 weeks ago
- Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.☆37Oct 6, 2025Updated 6 months ago
- some kernel pwn practice questions.☆25Nov 25, 2024Updated last year
- ☆33Jun 11, 2024Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- 华南师范大学计算机学院编译原理课程实验4:LR(0)和SLR(1)文法分析器☆10Dec 21, 2023Updated 2 years ago