ExploitEducation / Phoenix
Phoenix
☆44Updated 6 years ago
Alternatives and similar repositories for Phoenix:
Users that are interested in Phoenix are comparing it to the libraries listed below
- Reverse engineering challenges☆50Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆67Updated 7 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 5 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago
- Writeup for the OverTheWire Advent Bonanza 2019 CTF (https://advent2019.overthewire.org/)☆14Updated 4 years ago
- Extra goodies for GEF to (try to) make GDB suck even less☆155Updated 2 weeks ago
- FAUST Gameserver for attack-defense CTFs☆70Updated last month
- A tool for finding the one gadget RCE in libc☆74Updated 4 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆49Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆52Updated 8 years ago
- Slides from our technical talks☆28Updated 3 months ago
- A full English version of the popular ctf-wiki☆83Updated 6 months ago
- ☆20Updated 3 years ago
- Binary Golf Library☆62Updated 3 years ago
- Exploitation and Mitigation Slides☆127Updated 7 months ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- Useful tips by OTA CTF members☆137Updated 5 years ago
- Very simple script(s) to hasten binary exploit creation☆92Updated 3 years ago
- Where CTFs happen☆80Updated 8 months ago
- esoteric☆51Updated 4 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆60Updated 5 years ago
- notes and code on past CTFs☆101Updated 3 years ago
- Fork Free Fail Repeat☆46Updated 3 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 2 months ago
- ☆159Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- RE / Binary Exploitation Resources☆67Updated 7 years ago