CUCyber / cuctf-2019-challenges
Challenges used in CUCTF 2019
☆24Updated 4 years ago
Related projects: ⓘ
- Stash for Binary Exploitation and Reverse Engineering Resources☆96Updated 3 years ago
- ☆56Updated 4 months ago
- esoteric☆50Updated 4 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Repo to archive the 2019 RITSEC CTF Challenges & Documentation☆32Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆89Updated 3 years ago
- Code snippets for bare-metal malware development☆94Updated 2 years ago
- Collection of resources for my preparation to take the OSEE certification.☆214Updated 4 years ago
- European Cyber Security Challenge Gameboard☆28Updated 2 years ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 2 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated last year
- OSEE Preparation☆166Updated 5 years ago
- Reverse engineering challenges☆50Updated 4 years ago
- Binary Golf Library☆62Updated 3 years ago
- ☆152Updated 2 years ago
- CTF writeups from The Flat Network Society☆127Updated 2 months ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆58Updated 5 years ago
- All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs☆18Updated 4 years ago
- Dockerized setup for quick pwning☆23Updated 3 years ago
- CTF challenge writeups☆13Updated 3 years ago
- 'Ike: A binary exploitation and reversing handbook.☆66Updated last year
- ☆41Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆58Updated 3 years ago
- Useful tips by OTA CTF members☆135Updated 4 years ago
- ☆80Updated 6 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- Cheat sheet of binary protections flags☆22Updated 4 years ago
- ☆58Updated 2 months ago
- Slides from our technical talks☆25Updated last week
- Phoenix☆39Updated 5 years ago