ECSC2022 / ctf-services
A/D CTF services developed for ECSC 2022
☆10Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for ctf-services
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆36Updated last year
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆49Updated this week
- HN Security's advisories.☆21Updated 3 weeks ago
- Cross-architecture instruction counting for CTF solving☆42Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- A library for patching ELFs☆53Updated 3 years ago
- ☆12Updated 2 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆44Updated 5 months ago
- Leveraging patch diffing to discover new vulnerabilities☆108Updated last month
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆59Updated last year
- Protocol Reverse Engineering Resources☆20Updated last year
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆58Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆22Updated 7 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- Common Corpus is used to build coverage-minimized corpus data sets for fuzzing.☆24Updated last year
- ☆16Updated 4 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- ☆26Updated 3 weeks ago
- weggli ruleset scanner for source code and binaries☆18Updated last week
- ☆59Updated 2 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 9 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆61Updated 7 months ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆12Updated 2 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆20Updated 2 years ago