eastXueLian's reservoir of CTF puzzles.
☆16Nov 27, 2024Updated last year
Alternatives and similar repositories for ctf-writeup-collection
Users that are interested in ctf-writeup-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 11 months ago
- ☆103Dec 17, 2025Updated 3 months ago
- Exploit scripts for ctf challenges that involves linux kernel pwning☆17Dec 10, 2024Updated last year
- A pwn learning repo containing multiple pwn program codes.☆36Mar 11, 2026Updated 2 weeks ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- For V8CTF M123☆17Aug 25, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- A collection of web browser CTF challenges and solutions.☆33Dec 30, 2022Updated 3 years ago
- ☆34Apr 14, 2025Updated 11 months ago
- ☆38May 10, 2024Updated last year
- ☆16Apr 17, 2024Updated last year
- CTF MISC 方向从入门到精通指南,个人 MISC 知识点总结☆20Sep 15, 2025Updated 6 months ago
- 2019年暨南大学CTF新生赛题目与源码☆14Jan 8, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- Archive of AAA CTF 2025 (XCTF competition)☆12May 7, 2025Updated 10 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆86Jul 9, 2025Updated 8 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆62Dec 12, 2023Updated 2 years ago
- Agentic malware analysis environment with MCP-connected disassemblers, RE tooling, and structured workflows for Claude Code and Codex CLI…☆135Mar 18, 2026Updated last week
- My browser pwn collections. Mainly JavaScript engine stuff.☆34Mar 12, 2026Updated 2 weeks ago
- some ida script☆34Aug 18, 2021Updated 4 years ago
- Insert in db an passwords list☆23Oct 5, 2024Updated last year
- 华师CTF 2019 新生赛题目☆20Dec 9, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Linux kernel privilege escalation techniques☆153Aug 9, 2024Updated last year
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- ☆273Aug 2, 2025Updated 7 months ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- Rustで作成されたバイナリのリバースエンジニアリング調査レポート☆62Dec 1, 2025Updated 3 months ago
- ☆11Sep 6, 2024Updated last year
- 零基础入门V8引擎漏洞挖掘☆285Apr 8, 2024Updated last year
- Writeups for some CTF challenges. I keep the copy of task files in case you would like to try them yourself.☆12Oct 4, 2021Updated 4 years ago
- Applies ROME and MEMIT on Mamba-S4 models☆14Apr 5, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- powershell免杀混淆器,简单有效。A simple and effective powershell obfuscaiton tool bypass Anti-Virus☆19Dec 2, 2022Updated 3 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.☆37Oct 6, 2025Updated 5 months ago
- some kernel pwn practice questions.☆25Nov 25, 2024Updated last year
- ☆34Jun 11, 2024Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago