InsecurityAsso / inshack-2018
Challenges for INShAck 2018
☆25Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for inshack-2018
- Slack bot for challenge management in large teams☆60Updated last year
- Source code, descriptions and writeups of INS'hAck 2019 CTF challenges!☆33Updated 5 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 5 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆50Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- Personal repository for all ctf related stuffs☆68Updated last week
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- Setup for a pwning VM☆60Updated 6 years ago
- ☆96Updated 3 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 5 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆27Updated 6 years ago
- ☆88Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- CLI tool to get the links of original writeups from ctftime.org☆32Updated 4 years ago
- r2con2019 - slides and materials☆135Updated 4 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- Helper script for working with format string bugs☆56Updated 4 years ago
- BSidesCBR CTF docker compose files☆68Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆58Updated 3 years ago
- Automatic Vulnerability Discovery☆37Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- various CTF writeups☆60Updated 6 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆34Updated 9 months ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago