Examples of FSB exploitable binaries that can be used to practice FSB.
☆35Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for how2fsb
Users that are interested in how2fsb are comparing it to the libraries listed below
Sorting:
- Guide to buffer overflows☆59Sep 3, 2021Updated 4 years ago
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- ☆21Apr 2, 2024Updated last year
- ☆27Apr 6, 2018Updated 7 years ago
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- ☆19Oct 27, 2018Updated 7 years ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Dumping CTF related code here☆17May 3, 2017Updated 8 years ago
- Lord of SQL Injection (주석은 한글로 작성되어 있습니다. / Comments were written in Korean!)☆14Aug 22, 2017Updated 8 years ago
- Collection of images and examples to use with Shoggoth.☆19Aug 24, 2020Updated 5 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- The rev.ng demos☆13Mar 11, 2026Updated last week
- Stereotyped Challenges (2014~2023)☆84Jan 17, 2023Updated 3 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- CTF Writeups☆39Sep 23, 2018Updated 7 years ago
- Official training ground for the OTA CTF team☆39Dec 7, 2022Updated 3 years ago
- A repository of challenges from various CTF competitions.☆157Apr 13, 2014Updated 11 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- A VM for CTF binary exploitation challenges☆20Mar 11, 2020Updated 6 years ago
- Collection of CTF challenges I made☆53Jan 3, 2025Updated last year
- ☆51Mar 23, 2018Updated 7 years ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆19Apr 14, 2024Updated last year
- AVR assembly plugin for Binary Ninja☆12Jun 6, 2018Updated 7 years ago
- personal portfolio website template for mobile developer showcases a developer's skills, projects, and experience in one web page.☆10Dec 14, 2024Updated last year
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- ☆22Dec 1, 2021Updated 4 years ago
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- Programmatic disassembly and patching☆69Dec 30, 2016Updated 9 years ago
- An in depth tutorial on how to do binary exploitation☆454Jun 19, 2018Updated 7 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago