Examples of FSB exploitable binaries that can be used to practice FSB.
☆35Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for how2fsb
Users that are interested in how2fsb are comparing it to the libraries listed below
Sorting:
- ☆21Apr 2, 2024Updated last year
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- ☆19Oct 27, 2018Updated 7 years ago
- Files accompanying helm security blog post☆12Aug 7, 2021Updated 4 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 7 months ago
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- Lord of SQL Injection (주석은 한글로 작성되어 있습니다. / Comments were written in Korean!)☆14Aug 22, 2017Updated 8 years ago
- Dumping CTF related code here☆17May 3, 2017Updated 8 years ago
- SolveMe - Jeopardy CTF Platform☆53Oct 27, 2023Updated 2 years ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆19Apr 14, 2024Updated last year
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- CTF Writeups☆39Sep 23, 2018Updated 7 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Official training ground for the OTA CTF team☆39Dec 7, 2022Updated 3 years ago
- ☆22Aug 28, 2023Updated 2 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Collection of images and examples to use with Shoggoth.☆19Aug 24, 2020Updated 5 years ago
- A VM for CTF binary exploitation challenges☆20Mar 11, 2020Updated 5 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- General tips and advice for becoming interested in research, finding a suitable topic, and setting goals.☆28Mar 17, 2021Updated 4 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- My solution for GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 10, 2020Updated 5 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- Stereotyped Challenges (2014~2023)☆85Jan 17, 2023Updated 3 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- ☆26Feb 16, 2021Updated 5 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- Send WiFi credentials over audio to a "thing"