ECSC2024 / openECSC-2024Links
Source code of the challenges developed for the 2024 edition of openECSC
☆73Updated 9 months ago
Alternatives and similar repositories for openECSC-2024
Users that are interested in openECSC-2024 are comparing it to the libraries listed below
Sorting:
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆37Updated 8 months ago
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆138Updated 5 months ago
- Files + Writeups for DownUnderCTF 2023 Challenges☆170Updated last year
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆215Updated last year
- A full English version of the popular ctf-wiki☆96Updated last year
- Network analysis tool for Attack Defence CTF☆328Updated 2 weeks ago
- Source code and documentation for TeamItaly CTF 2022 challenges☆42Updated 2 years ago
- My notes on pwn☆287Updated 3 months ago
- Write-ups for various CTF☆192Updated last year
- Challenges I created for CTF competitions.☆204Updated 3 months ago
- ☆45Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆118Updated last year
- Runs exploits, fast.☆84Updated 11 months ago
- A Python library to debug binary executables, your own way.☆236Updated this week
- ☆26Updated 10 months ago
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago
- Infrastructure for the Potluck CTF☆25Updated last year
- ☆37Updated 2 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆118Updated 3 weeks ago
- 🎵 Official source code and writeups for SekaiCTF 2024!☆79Updated 10 months ago
- Python library for CTFer☆145Updated 2 months ago
- Python sandbox escape wiki + payload generator☆89Updated 9 months ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆48Updated last week
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆104Updated 6 months ago
- ☆100Updated last year
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆89Updated 4 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆82Updated 2 years ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆76Updated 2 months ago
- Many-Time Pad Interactive☆174Updated last year
- A toolkit for cryptanalysis using lattices.☆124Updated last year