HackerDom / ructfe-2015
RuCTFE 2015
☆21Updated 8 years ago
Related projects: ⓘ
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 7 years ago
- CTF writeups☆109Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆37Updated 9 years ago
- IDA plugin for software reverse-engineering and visualization.☆7Updated 8 years ago
- SHURIKEN: Exploit throwing framework☆36Updated 8 years ago
- Helper script for working with format string bugs☆54Updated 4 years ago
- ☆29Updated this week
- ☆26Updated 6 years ago
- CTF & practice exploit collection☆38Updated 7 years ago
- ARM rop chain gadget searcher☆37Updated 6 years ago
- PoC for CVE-2015-6086☆67Updated 8 years ago
- Simple shellcode testing tool.☆48Updated 12 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆45Updated 2 years ago
- ☆35Updated 12 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Updated 8 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 9 years ago
- ☆11Updated 4 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- Belluminar 2016 Beijing stuff☆25Updated 8 years ago
- Precise Code Tracking (Vim)☆31Updated 8 years ago
- A collection of more than 1000 binary libc files☆86Updated 9 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆28Updated 10 years ago
- Code samples used for the blog post☆23Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Library for creating CTF services.☆75Updated 7 years ago
- ☆36Updated this week
- ☆38Updated 8 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 7 years ago