Wiki-like CTF write-ups repository by ByteBandits
☆102Sep 21, 2025Updated 5 months ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- ☆92Aug 18, 2024Updated last year
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- CTF write-ups from the VulnHub CTF Team☆718Apr 2, 2018Updated 7 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Mar 25, 2019Updated 6 years ago
- An ELF parsing and manipulation library for Python☆74Oct 24, 2014Updated 11 years ago
- This contains Helpful PYKD (Python Extension for Windbg) scripts☆49Mar 9, 2015Updated 10 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead☆16Aug 2, 2015Updated 10 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- A utility to dump memory of unixy processes☆18Apr 5, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- Simple FTP fuzzer to demonstrate boofuzz usage.☆29May 21, 2021Updated 4 years ago
- ☆142Apr 21, 2017Updated 8 years ago
- CTF (Capture The Flag Writeups and Tools)☆54Apr 15, 2019Updated 6 years ago
- CTF writeup for learning☆22Apr 6, 2021Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 7 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago