HackerDom / ructfe-2016
☆23Updated 5 years ago
Alternatives and similar repositories for ructfe-2016:
Users that are interested in ructfe-2016 are comparing it to the libraries listed below
- A Wargame based on the Matasano Crypto Challenges☆70Updated 8 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- ☆11Updated 5 years ago
- Hodor! Fuzzer..☆128Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 9 years ago
- fuzz☆125Updated 9 years ago
- Write-ups for various CTF challenges solved by the team☆16Updated 7 years ago
- Extension library for the Kitty fuzzing framework☆79Updated 5 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- ☆89Updated 4 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆141Updated 6 years ago
- Unix remote login tool, rootkit shell tool☆35Updated 9 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆35Updated 5 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- CTF writeups☆112Updated 7 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 10 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- Exploits for interesting CTF challenges I have worked on☆64Updated 8 years ago
- Tools for stress testing applications.☆12Updated 4 years ago
- A Browser Fuzzer for Vulnerbilities☆65Updated 10 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- RuCTF 2016 repository☆16Updated 5 years ago
- ☆89Updated 7 months ago
- Resources for reverse engineering Go binaries☆41Updated 10 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆49Updated 12 years ago