CUCyber / cuctf-2019-challengesLinks
Challenges used in CUCTF 2019
☆25Updated 5 years ago
Alternatives and similar repositories for cuctf-2019-challenges
Users that are interested in cuctf-2019-challenges are comparing it to the libraries listed below
Sorting:
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆105Updated 4 years ago
- ☆105Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆320Updated 2 years ago
- pwninit - automate starting binary exploit challenges☆973Updated last year
- Binary Golf Examples and Resources☆256Updated last year
- ☆169Updated 3 years ago
- A collection of pwn/CTF related utilities for Ghidra☆688Updated 11 months ago
- knowledge is power☆225Updated 3 weeks ago
- Collection of resources for my preparation to take the OSEE certification.☆286Updated 4 years ago
- A Ghidra script to save small patches back to the executable file☆224Updated 4 years ago
- Vulnerable server used for learning software exploitation☆1,067Updated 4 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆82Updated 2 years ago
- ☆630Updated 5 months ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆452Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆343Updated 5 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆580Updated last month
- 'Ike: A binary exploitation and reversing handbook.☆84Updated last week
- Repo to archive the 2019 RITSEC CTF Challenges & Documentation☆33Updated 5 years ago
- CTF writeups from The Flat Network Society☆143Updated last month
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆57Updated 2 years ago
- Example pwnable challenge hosted with docker☆225Updated last year
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆333Updated 3 years ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆225Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,363Updated 7 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆706Updated 10 months ago
- Repository to index useful tools for CTF's☆27Updated 2 months ago
- esoteric☆55Updated 4 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago