DefconRome / meetings-2020Links
Slides and stuffs of the meetings during the 2020.
☆16Updated 3 years ago
Alternatives and similar repositories for meetings-2020
Users that are interested in meetings-2020 are comparing it to the libraries listed below
Sorting:
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- ☆23Updated 4 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆30Updated 5 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- Simulate afl-fuzz☆16Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆30Updated 6 years ago
- Routines for hunting down kernel structs.☆41Updated 13 years ago
- Slides and stuffs of the meetings during the 2018☆13Updated 3 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 7 years ago
- python and honggfuzz☆25Updated 5 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Show syscall information for different architectures☆15Updated 7 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 6 years ago
- ☆28Updated 5 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆25Updated 5 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆53Updated 5 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆70Updated 8 years ago
- Python module to help in exploitation of the FILE structure in C☆27Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Launch radare2 like a boss from pwntools in tmux☆26Updated 5 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- Ditto.☆18Updated 4 years ago