CUCyber / cuctf-2019-challenges
Challenges used in CUCTF 2019
☆25Updated 5 years ago
Alternatives and similar repositories for cuctf-2019-challenges
Users that are interested in cuctf-2019-challenges are comparing it to the libraries listed below
Sorting:
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- esoteric☆52Updated 4 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- ☆62Updated 10 months ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 3 years ago
- Vulnerabilities, exploits, and PoCs☆35Updated 2 weeks ago
- PoC code using debugfs to store files in memory and execute them☆26Updated 6 years ago
- ☆44Updated 3 years ago
- ☆83Updated 7 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- competition hackpack used by CU Cyber☆22Updated 3 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- Binary Golf Library☆62Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆103Updated 4 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆61Updated 4 years ago
- ☆18Updated 5 years ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- ☆49Updated 2 years ago
- Binary Golf Grand Prix☆55Updated 2 months ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆43Updated 2 years ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 5 years ago
- All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs☆19Updated 5 years ago
- tools for shellcoding☆56Updated last year
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- A curated list of resources for the OSED journey.☆63Updated 3 years ago
- Linux process injection PoCs☆30Updated last year
- QuoteDB (Vulnerable TCP Server)☆70Updated last year