Enigmatrix / ctfbot
CTF Bot for Discord
☆6Updated 2 years ago
Alternatives and similar repositories for ctfbot:
Users that are interested in ctfbot are comparing it to the libraries listed below
- esoteric☆51Updated 4 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Updated 3 years ago
- ☆26Updated 3 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆110Updated 5 years ago
- Exploitation and Mitigation Slides☆127Updated 9 months ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- CTFd Dump - When you want to have an offline copy of a CTF.☆47Updated 8 months ago
- Useful tips by OTA CTF members☆138Updated 5 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 4 months ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆142Updated 3 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆24Updated 8 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆29Updated 5 years ago
- A tool for finding the one gadget RCE in libc☆75Updated 4 years ago
- My solutions for CTF challenges☆67Updated 3 months ago
- Web Exploitation Workflow for CTF Challenges☆49Updated 8 years ago
- ☆189Updated 7 years ago
- Automatic ROPChain Generation☆284Updated 5 years ago
- ☆161Updated 2 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 3 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- A collection of curated resources and CVEs I use for research.☆105Updated 3 years ago
- DiceCTF 2021 challenge archive☆22Updated 3 years ago
- CTFs and solutions for Linux binary exploitation.☆108Updated 9 months ago
- ☆134Updated 5 years ago
- ☆108Updated 5 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆68Updated 7 years ago
- ☆45Updated last year