HackerDom / ructf-2022Links
RuCTF 2022. Developed with ♥ by Hackerdom team
☆10Updated 3 years ago
Alternatives and similar repositories for ructf-2022
Users that are interested in ructf-2022 are comparing it to the libraries listed below
Sorting:
- Repo for talk slides & materials☆21Updated last year
- Proof-of-Concept of exploits that may be published☆22Updated last year
- public archive for corCTF 2023☆18Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated 11 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 9 months ago
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆110Updated 3 weeks ago
- ☆81Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Updated last year
- A in-the-wild V8 type confusion bug.☆28Updated 3 months ago
- My challenges for SECCON CTF 2022 Finals☆18Updated 2 years ago
- Materials for CVE-2024-30052.☆12Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 10 months ago
- public archive for corCTF 2022☆37Updated 3 years ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Updated 11 months ago
- Analysis of the vulnerability☆51Updated last year
- ☆37Updated last year
- ☆23Updated 2 years ago
- ☆72Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 11 months ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆159Updated 2 months ago
- Universal root exploit for the linux kernel☆36Updated last year
- Challenge repository for ACSC 2024☆13Updated last year
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated last month
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Updated 3 years ago
- ☆37Updated last year
- IrisCTF 2023 challenges.☆15Updated 2 years ago
- archive of the released challenges from corCTF 2021☆25Updated 4 years ago