Here are the challenges (including sources) of the GreHack CTF.
☆107May 18, 2024Updated last year
Alternatives and similar repositories for CTF-challs
Users that are interested in CTF-challs are comparing it to the libraries listed below
Sorting:
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 9 months ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Feb 6, 2018Updated 8 years ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Aug 10, 2021Updated 4 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- Internship (research) project for SURF. Process (Net)Flow data into Nmap scans.☆12Jun 7, 2022Updated 3 years ago
- ☆19Oct 27, 2018Updated 7 years ago
- Kudelski Security's 2017 crypto challenge☆20Jul 6, 2017Updated 8 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆159Oct 9, 2018Updated 7 years ago
- ☆22May 20, 2016Updated 9 years ago
- CSAW Embedded Security Challenge 2019☆37Nov 24, 2019Updated 6 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- ☆14Sep 1, 2024Updated last year
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- BSidesSF CTF 2017 release☆126May 27, 2022Updated 3 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- ECDSA VHDL Implementation☆12Apr 6, 2018Updated 7 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- The rev.ng demos☆13Jan 29, 2026Updated last month
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- X-CTF 2016 Qualifiers Challenges Source☆12May 24, 2016Updated 9 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 3 months ago
- Side-channel traces visualizer☆16Apr 28, 2025Updated 10 months ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- Listen for usb devices and automatically submit all files on device to cuckoo☆13Apr 30, 2017Updated 8 years ago
- ☆26May 7, 2018Updated 7 years ago
- NFC monitor daemon which is able to launch modules (libraries) on action (tag inserted or removed)☆34Aug 13, 2019Updated 6 years ago
- A hex/binary black box analysis tool☆13Aug 31, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- ☆93Jul 2, 2018Updated 7 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆672Apr 10, 2024Updated last year