ECSC2024 / openECSC-2024Links
Source code of the challenges developed for the 2024 edition of openECSC
☆75Updated last year
Alternatives and similar repositories for openECSC-2024
Users that are interested in openECSC-2024 are comparing it to the libraries listed below
Sorting:
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆140Updated 10 months ago
- Files + Writeups for DownUnderCTF 2023 Challenges☆173Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆249Updated last year
- ☆45Updated 2 years ago
- Network analysis tool for Attack Defence CTF☆406Updated 2 months ago
- Write-ups for various CTF☆217Updated 3 months ago
- ☆27Updated last year
- A toolkit for cryptanalysis using lattices.☆134Updated 2 years ago
- Files + Solutions for DownUnderCTF 2025 Challenges☆104Updated 5 months ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆41Updated last year
- Hosting awesome cryptography CTF challenges from past CTFs☆127Updated 6 months ago
- Challenges I created for CTF competitions.☆241Updated this week
- Cheatsheet useful for solving Python-related challenges during CTFs.☆88Updated 3 weeks ago
- A Python library to debug binary executables, your own way.☆293Updated this week
- Source code and documentation for TeamItaly CTF 2022 challenges☆44Updated 2 years ago
- ctf writeups by the rounding error team ✏️☆34Updated 7 months ago
- My notes on pwn☆290Updated this week
- Repository to keep track of python memory corruption bugs that can be used to potentially bypass audit hooks☆61Updated 3 weeks ago
- Python sandbox escape wiki + payload generator☆138Updated last year
- A full English version of the popular ctf-wiki☆107Updated last year
- 🎵 Official source code and writeups for SekaiCTF 2024!☆84Updated 4 months ago
- Files + Solutions for DownUnderCTF 2024 Challenges☆117Updated last year
- VirtuAlization GDb integrations in pwntools☆38Updated last month
- Infrastructure for the Potluck CTF☆25Updated last year
- Source code for the DEF CON 33 CTF Qualifiers.☆55Updated 4 months ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Updated last year
- Many-Time Pad Interactive☆176Updated last year
- Coppersmith's method for multivariate polynomials☆192Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆89Updated 2 years ago
- A pure python tool to implement/exploit the hash length extension attack☆37Updated 2 years ago