HackerDom / ructf-2016Links
RuCTF 2016 repository
☆16Updated 5 years ago
Alternatives and similar repositories for ructf-2016
Users that are interested in ructf-2016 are comparing it to the libraries listed below
Sorting:
- ☆36Updated 12 years ago
- IDA plugin for software reverse-engineering and visualization.☆7Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- RuCTFE 2015☆21Updated 9 years ago
- Code samples used for the blog post☆24Updated 8 years ago
- ☆26Updated 7 years ago
- ☆38Updated 9 years ago
- ☆89Updated 11 months ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- ☆16Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Fuzzing results for various interpreters.☆82Updated 7 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆35Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 6 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- ☆15Updated 7 years ago
- Some RSA attacks with sage☆11Updated 8 years ago
- CTF writeups☆113Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- ☆49Updated 7 years ago
- Memory awesomeness.☆29Updated 10 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Updated 9 years ago
- A x86 systematic ROP payload generation☆56Updated 5 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 9 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago