CUCyber / cuctf-2019-challengesLinks
Challenges used in CUCTF 2019
☆25Updated 6 years ago
Alternatives and similar repositories for cuctf-2019-challenges
Users that are interested in cuctf-2019-challenges are comparing it to the libraries listed below
Sorting:
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 5 years ago
- Binary Golf Grand Prix☆116Updated 2 years ago
- Binary Golf Examples and Resources☆258Updated 2 months ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- ☆123Updated last year
- ☆661Updated 9 months ago
- knowledge is power☆229Updated 3 weeks ago
- ☆178Updated 3 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆86Updated 2 years ago
- Execute ELF files without dropping them on disk☆501Updated last year
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆161Updated 7 months ago
- All Files, Scripts, and exploits can be found here☆72Updated 4 years ago
- Binary Golf Grand Prix☆83Updated 3 weeks ago
- A collection of pwn/CTF related utilities for Ghidra☆700Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆373Updated 9 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆590Updated last week
- ctfcli is a tool to manage Capture The Flag events and challenges☆201Updated 2 weeks ago
- A multi-tenant network sandbox for security challenges☆85Updated last year
- A multi-arch assembly REPL and emulator for your command line.☆311Updated last year
- Repo to archive the 2019 RITSEC CTF Challenges & Documentation☆33Updated 5 years ago
- Example pwnable challenge hosted with docker☆228Updated last year
- RE / Binary Exploitation Resources☆72Updated 8 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆468Updated last year
- Runs exploits, fast.☆107Updated 3 months ago
- pwninit - automate starting binary exploit challenges☆1,053Updated last month
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 5 months ago
- ☆232Updated 2 years ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- ☆51Updated 4 years ago