CUCyber / cuctf-2019-challengesLinks
Challenges used in CUCTF 2019
☆25Updated 6 years ago
Alternatives and similar repositories for cuctf-2019-challenges
Users that are interested in cuctf-2019-challenges are comparing it to the libraries listed below
Sorting:
- A collection of pwn/CTF related utilities for Ghidra☆694Updated last year
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆106Updated 5 years ago
- pwninit - automate starting binary exploit challenges☆1,002Updated last year
- Binary Golf Examples and Resources☆257Updated last year
- knowledge is power☆229Updated 2 months ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆197Updated last month
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆85Updated 2 years ago
- ☆637Updated 6 months ago
- ☆111Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆581Updated 3 weeks ago
- ☆172Updated 3 years ago
- Runs exploits, fast.☆96Updated last week
- Automatic exploit generation for simple linux pwn challenges.☆320Updated 2 years ago
- ☆42Updated last year
- High Octane Triage Analysis☆773Updated this week
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆354Updated 6 months ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- ☆199Updated 8 months ago
- Collection of resources for my preparation to take the OSEE certification.☆288Updated 5 years ago
- Some CrackMe codes for Linux x86/x86_64☆386Updated 2 years ago
- CTF writeups from The Flat Network Society☆149Updated 3 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆706Updated last year
- Vulnerable server used for learning software exploitation☆1,081Updated 5 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,367Updated 8 months ago
- Python Command-Line Ghidra Binary Diffing Engine☆694Updated 3 weeks ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆458Updated last year
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆231Updated last year
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆335Updated 3 years ago
- A Ghidra script to save small patches back to the executable file☆224Updated 4 years ago